Software Security Research Topics Ideas [MS PhD]
List of Research Topics and Ideas of Software Security for MS and Ph.D. Thesis.
- A hierarchical model for quantifying software security based on static analysis alerts and software metrics
- An Approach to Improving Software Security Through Access Control for Data in Programs
- Moderator Factors of Software Security and Performance Verification
- A survey and classification of the security anomaly detection mechanisms in software defined networks
- Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks
- Measuring and modeling software vulnerability security advisory platforms
- A security pattern detection framework for building more secure software
- Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective
- Open Chance and Risk Management Process Supported by a Software Tool for Improving Urban Security
- Software-defined network (SDN) architecture and security considerations for 5G communications
- CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development
- Software-defined networking and architecture of iot with security, challenges and applications: A survey
- Research on Network Security Risk and Security Countermeasures of 5G Technology in Power System Application
- Detection and Prevention from DDoS Attack Using Software-Defined Security
- Choosing the Weapon: A Comparative Study of Security Analyzers for Android Applications
- Software Deception Steering through Version Emulation
- Finding Software Bugs in Embedded Devices
- Preliminary Study On It Security Maintenance Management In Malaysia Organizations
- A survey on intrusion detection system for software defined networks (SDN)
- Enhance Web Application Security Using Obfuscation
- Investigating the Interaction between Energy Consumption, Quality of Service, Reliability, Security, and Maintainability of Computer Systems and Networks
- Identification of Security Requirements from the Selected Set of Requirements under Fuzzy Environment
- Information Security in Software-Defined Network
- IoT-Enabled Agricultural System Application, Challenges and Security Issues
- Risk assessment method for IoT software supply chain vulnerabilities
- Security smells in ansible and chef scripts: A replication study
- Quantitative System-Level Security Verification of the IoV Infrastructure
- Measuring Security: A Step Towards Enhancing Security of System
- CompTIA security+ guide to network security fundamentals
- Security trends in Internet of Things: a survey
- Sysevr: A framework for using deep learning to detect software vulnerabilities
- A perspective on using blockchain for ensuring security in smart card systems
- Trusted Enforcement of Application-specific Security Policies
- A new enhanced cyber security framework for medical cyber physical systems
- A study of security challenges from a federeated cloud perspective
- Current security issues in the information society
- Security Audit of a Blockchain-Based Industrial Application Platform
- A Zero Trust Hybrid Security and Safety Risk Analysis Method
- Vehicle Speed Control and Security System
- Integration of Security Standards in DevOps Pipelines: An Industry Case Study
- Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm
- 10 Information security management in the cloud computing environment
- Wireless Network Security using RF Fingerprinting
- The Only Rule-Software Wins
- Systematic mutation-based evaluation of the soundness of security-focused android static analysis techniques
- Internet of Things: Enabling Technologies, Security and Social Implications
- BugMiner: Mining the Hard-to-Reach Software Vulnerabilities through the Target-Oriented Hybrid Fuzzer
- A survey on security and privacy of federated learning
- Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry
- Blockchain-Enabled Collaborative Intrusion Detection in Software Defined Networks
- User Experience Design for E-Voting: How mental models align with security mechanisms
- Cloud Computing Offered Capabilities: Threats to Software Vendors
- A fine-grained classification and security analysis of web-based virtual machine vulnerabilities
- A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises
- The android platform security model
- Applying Software Defined Network Concepts for Securing the Client Data Signals Over the Optical Transport Network of Egypt
- A Case for Unikernels in IoT: Enhancing Security and Performance
- Islands of (in) security in the Anthropocene
- Present and Future of Network Security Monitoring
- A Systematic Review of the State of Cyber-Security in Water Systems
- Cyber-Security of Smart Microgrids: A Survey
- Cybersecurity knowledge and skills taught in capture the flag challenges
- Cloud Computing Security Challenges, Threats and Vulnerabilities
- Modeling and Analysis of Security in Design Phase of IoT Based Applications Using Security Patterns
- Discuss the Security Countermeasures and Data Protection of Library Computer Network
- Smartphone security and forensic analysis
- A Home Security Camera System Based on Cloud and SNS
- Design and Implementation of Virtual Security Function Based on Multiple Enclaves
- Towards ASM-based automated formal verification of security protocols
- Directed Test Generation for Activation of Security Assertions in RTL Models
- Privacy and security in connected hearing healthcare
- Security Threats and Their Mitigations in IoT Devices
- Innovative Solutions for Ensuring Information Security of Modern Enterprises
- A comprehensive study on security in IoT and resolving security threats using machine learning (ML)
- SE: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android
- Azure Network Security Configuration
- DPLOOP: Detection and Prevention of Loopholes in Web Application Security
- Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies
- Collaborative Edge Computing for Smart Villages [Energy and Security]
- Cyber security training for critical infrastructure protection: A literature review
- Dual-Layer Security and Access System to Prevent the Spread of COVID-19
- Digital Health Data and Data Security
- Behavioral information security: Defining the criterion space
- Proof-of-PUF enabled Blockchain: concurrent data and device security for Internet-of-Energy
- IoT Dynamic Log File Analysis: Security Approach for Anomaly Detection In Multi Sensor Environment
- IoT: Security Attacks and Countermeasures
- Performance Evaluation of Attribute-Based Encryption in Automotive Embedded Platform for Secure Software Over-The-Air Update
- Network Security Policy for Higher Education Institutions based on ISO Standards
- Assessing the Security of Campus Networks: The Case of Seven Universities
- Internet of Things backdoors: Resource management issues, security challenges, and detection methods
- Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting their Security and Reliability
- Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective
- A review on architecture and models for autonomic software systems
- Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers
- Secure access of resources in software-defined networks using dynamic access control list
- On the relationship between it privacy and security behavior: A survey among german private users
- Mitigating Security Challenges in Smart Home Management Through Smart Lock
- Power Distance as a Variable in Assessing Employees’ Behavior towards Information Security Policy Compliance in a High-Power Distance Society: An …
- Detecting Insider Threat via a Cyber-Security Culture Framework
- Cloud Computing Security: Hardware-Based Attacks and Countermeasures
- IoT data security with DNA-genetic algorithm using blockchain technology
- A Design of Improvement Method of Central Patch Controlled Security Platform Using Blockchain
- Method for Intelligent Information Processing Using Software Reuse Library and Blockchain Architecture
- Home automation system for security and temperature control using microcontroller based with smartphone applications
- Overview of Five Techniques Used for Security and Privacy Insurance in Smart Cities
- Reducing Cybersecurity Vulnerabilities Through the Use of 12N QR Codes
- Risks and security solutions existing in the Internet of things (IoT) in relation to Big Data
- A survey of Intel SGX and its applications
- Security Issues in Cloud Computing: A Review
- Fuzzy cognitive modeling of product import and export impacts on food security
- Cognitive Radio Network-Based Design and Security Challenges in 5G Communication
- Smart Factory Security: A Case Study on a Modular Smart Manufacturing System
- Understanding the Quality of Container Security Vulnerability Detection Tools
- In-Vehicle Cyber Security
- Toward Inclusion of Children as Software Engineering Stakeholders
- Extended Security in Heterogeneous Distributed SDN Architecture
- Cloud and Edge Computing Security Challenges, Demands, Known Threats, and Vulnerabilities
- Secure Transactions Management Using Blockchain as a Service Software for the Internet of Things
- Probabilistic Estimation of Threat Intrusion in Embedded Systems for Runtime Detection
- Design and Implementation of Virtual Security Function Based on Multiple Enclaves. Future Internet 2021, 13, 12
- An efficient lightweight cryptographic algorithm for IoT security
- Enhancing the Security, Reliability, and Data Integrity Issues in the Internet of Things by Implementing Blockchain Strategy in Mining: Challenges and Solutions
- A Survey on Various Security Issues for 5G Mobile Networks in WSN
- ProFuzzBench: A Benchmark for Stateful Protocol Fuzzing
- Cell Phone Security: User Awareness of Security Issues and Mobile Device Management
- Classifier for DDoS Attack Detection in Software Defined Networks
- Home Security Alarm Using Wemos D1 And HC-SR501 Sensor Based Telegram Notification
- A Survey on Cloud Computing Security Issues, Attacks and Countermeasures
- Prospects for Handling 5G Network Security: Challenges, Recommendations and Future Directions
- A flexible tool for estimating applications performance and energy consumption through static analysis
- Mobile and Cloud Computing Security
- Context-Aware Security for 6G Wireless The Role of Physical Layer Security
- Best ways computation intelligent of face cyber attacks
- A Systematic Survey on IoT Security Issues, Vulnerability and Open Challenges
- A Reward Based Formal Model for Distributed Software Defined Networks
- Ethereum smart contract security research: survey and future research opportunities
- Improving the Environmental Security of Urban Areas on the Basis of GIS and Web Technology
- Security and Trust in IoT Data Streams using Tangle Distributed Ledger and Node-RED Technology
- SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers
- Building Machine Learning Based Firewall on Spanning Tree Protocol over Software Defined Networking
- Security and Privacy in IOT
- Pest surveillance system for food security: A case study in the Philippines
- Design of Secure Coding Challenges for Cybersecurity Education in the Industry
- Understanding Factors Influencing Intention to Use E-government Services in Vietnam: Focused on Privacy and Security Concerns
- Security in Mobile Environments
- Awareness of Secure Coding Guidelines in the Industry–A first data analysis
- A Novel Method to Enhance Sustainable Systems Security in Cloud Computing Based on the Combination of Encryption and Data Mining
- Deep learning for security problems in 5G heterogeneous networks
- Data Security Using Cryptography & Steganography
- A SURVEY ON IMPROVISATION OF SECURITY OVER NETWORKING SYSTEM
- Use of Software on Modeling Hazardous Substance Release as a Support Tool for Crisis Management
- Operator action log based monitoring and control and its verification of nuclear power plants
- Software as a service, Semantic Web, and big data: Theories and applications
- Reduce Cyber Security Vulnerabilities: IaaS and Data
- A time-variant fault detection software reliability model
- Multimedia Security
- Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination
- Cloud Computing: Security Issues and Challenges
- Cloud Security Issues and Log-based Proactive Strategy
- Privacy and Security in Augmentation Technologies
- The Impact of Information and Communication Technology on Agricultural Systems and the Transition to Food Stability and Security (Case Study: Agricultural Jihad …
- Full-scene network security protection system based on ubiquitous power Internet of things
- Balancing Security: A Moving Target
- FPGA Implementation of Improved Security Approach for Medical Image Encryption and Decryption
- Layer based security in narrow band Internet of Things (NB-IoT)
- ANT-Centric IoT Security Reference Architecture–Security-by-Design for Satellite-Enabled Smart Cities
- P4Fuzz: Compiler fuzzer for dependable programmable dataplanes
- Wireless Networks Between Security and Efficiency
- Fear of the unknown with healthcare IoT devices: An exploratory study
- Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties
- Awareness of Secure Coding Guidelines in the Industry–A first data analysis
- Digital Nuclear Leadership for Safety and Security-Towards Effective Regulatory Control
- Verification of Embedded Software Binaries using Virtual Prototypes
- Security and Intelligent Management for Fog/Edge Computing Resources
- An architecture to manage security operations for digital service chains
- Security of Short-Range Wireless Technologies and an Authentication Protocol for IoT
- SE-PAC: A Self-Evolving PAcker Classifier against rapid packers evolution
- Vulnerabilities in Fog/Edge Computing from Architectural Perspectives
- A survey on blockchain for information systems management and security
- Model checking based unmanned aerial vehicle (UAV) security analysis
- The tacit dimension of expertise: Professional vision at work in airport security
- Security pre-warning system of underground pipelines based on BOTDR
- The risk of generating technical debt interest: a case study
- A systematic review and taxonomy of web applications threats
- Customer satisfaction with bank services: The role of cloud services, security, e-learning and service quality
- Construction of Perceptual Security Dataset for Video Selective Encryption Based on Double-Blind Subjective Experiment
- Efficient mobile security for E health care application in cloud for secure payment using key distribution
- The adopting factors of campus mobile software applications
- Optimization of security check efficiency in subway station based on Anylogic: A case study of Nanchang Metro
- Research on security situation assessment algorithm under virtual technology of cloud platform
- Architecture and security of SCADA systems: A review
- Options to Improve the General Model of Security Management in Private Bank with GDPR Compliance
- METHODS AND MEANS OF ENSURING CYBER SECURITY AS A COMPONENT OF THE INFORMATION SECURITY OF THE STATE
- A STUDY ON PRIVACY PRESERVING RANKED MULTI-KEYWORD SEARCH FOR MULTIPLE DATA OWNERS IN CLOUD COMPUTING.
- A Systematic Literature Review on Implementing Non-functional Requirements in Agile Software Development: Issues and Facilitating Practices
- Not All Branches Are Equal: An Improved QSYM Schema for Binary Vulnerability Mining
- Machine Learning based Malicious Payload Identification in Software-Defined Networking
- Safety and security of oil and gas pipeline transportation: A systematic analysis of research trends and future needs using WoS
- Data Security & Future Issues for Cloud Computing
- On the Requirements for Serious Games geared towards Software Developers in the Industry
- MSDN-GKM: Software Defined Networks Based Solution for Multicast Transmission with Group Key Management
- A Comprehensive Study of Privacy and Security Risk Awareness Among Mobile Internet Users for Social Networks Sites in Malaysia
- Digital Health or Internet of Things in Tele-Health: A Survey of Security Issues, Security Attacks, Sensors, Algorithms, Data Storage, Implementation Platforms, and …
- Exploiting Mixed Binaries
- Size, Speed, and Security: An Ed25519 Case Study.
- Maggie Dwyer and Thomas Molony (eds.), Social Media and Politics in Africa: Democracy, Censorship and Security
- Policing with the drone: Towards an aerial geopolitics of security
- Shifting traditional undergraduate software engineering instruction to a DevOps focus
- Text Mining for Secure Cyber Space
- Should Software Testing Continue After Release of a Software: A New Perspective
- Paillier Homomorphic Encryption with K-Means Clustering Algorithm (PHEKC) for Data Mining Security in Cloud
- Internet of Things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security and market opportunities
- Security Attacks and Defenses in Distributed Sensor Networks
- P2IDF: A Privacy-Preserving based Intrusion Detection Framework for Software Defined Internet of Things-Fog (SDIoT-Fog)
- Internet of Things: Architecture, Security Issues and Solutions
- Safety and Security in Knowledge Landscapes
- Book review: Malcolm N MacDonald and Duncan Hunter, The Discourse of Security: Language, Illiberalism and Governmentality
- FUZZOLIC: mixing fuzzing and concolic execution
- Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management
- Conceptual modeling of an IP phone communication system: A case study
- Analysis of the cost factors on E-government software cost using fuzzy decision making system
- Azure Security Center and Azure Sentinel
- Assessing dynamic China’s energy security: Based on functional data analysis
- Information and communication technologies in tourism
- Integrating Deep Reinforced Learning and Robotic Process Assessment in Blockchain Digital Transformation for Autonomous Cybersecurity
- Severity Prediction of Software Vulnerabilities Using Textual Data
- Security protocols analysis including various time parameters [J]
- Autonomic rejuvenation of cloud applications as a countermeasure to software anomalies
- IoT Security, Challenges, and Solutions: A Review
- Mobile Application Security Using Static and Dynamic Analysis
- Improving students’ problem-solving ability through the ‘information system security’project guided by the theory of inventive problem solving (TIPS)
- Cybersecurity for Automated Vehicles
- A Multi-Objective Hyper-Heuristic Improved Particle Swarm Optimization Based Configuration of SVM for Big Data Cyber Security
- Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges
- Architecture of Proposed Secured Crypto-Hybrid Algorithm (SCHA) for Security and Privacy Issues in Data Mining
- Corner case data description and detection
- An Approach for Refining Non-Functional Software Architectures
- Digital Transformation, Cyber Security and Resilience of Modern Societies
- An Empirical Study on Usability and Security of E-Commerce Websites
- Smart Guns Don’t Kill People
- Azure Kubernetes Services: Container Security
- Vuldeelocator: a deep learning-based fine-grained vulnerability detector
- Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
- On Security and Data Integrity Framework for Cloud Computing Using Tamper-Proofing
- Development of a composite measure for mapping rural food and nutrition security: application and validation in the drought-prone Bundelkhand region of India
- Towards security-Aware 5G slice embedding
- Security Systems for Smart Cities Based on Acoustic Sensors and Machine Learning Applications
- Security Risks Of Sharing Content Based On Minors By Their Family Members On Social Media In Times Of Technology Interference
- Comparative Study of RSA with Optimized RSA to Enhance Security
- Security Issues in Cloud Computing
- Confluence of 4G LTE, 5G, Fog, and Cloud Computing and Understanding Security Issues
- Security Implementations in IoT Using Digital Signature
- Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges
- Network Security and Prevention of Accounting Information System in the Era of Big Data
- Risk model development for information security in organization environment based on business perspectives
- Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
- Active Security by Implementing Intrusion Detection and Facial Recognition
- Applied Machine Learning to Vehicle Security
- Beyond internal conflict: The emergent practice of climate security
- Application of internet of things information security in the informationization of sports training and education
- Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller
- High-current light-ion cyclotron for applications in nuclear security and radioisotope production
- Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
- Security-SLA-guaranteed service function chain deployment in cloud-fog computing networks
- Federated Learning Empowered End-Edge-Cloud Cooperation for 5G HetNet Security
- A clustering approach towards cross-project technical debt forecasting
- Principles of incident response and disaster recovery
- High-assurance cryptography in the spectre era
- Offensive Cyber Security Trainer for Platform Management Systems
- Design Patterns and Electric Vehicle Charging Software
- DCT & DWT based watermarking scheme for medical information security
- Can Blockchain Technology Enhance Security and Privacy in the Internet of Things?
- Aspects of Biometric Security in Internet of Things Devices
- Wireless and mobile device security
- Conversion to Remote Proctoring of an Online Language Placement Exam
- The Digital Economy, Cyber Security and Russian Criminal Law
- Low-rate DDoS attacks detection method using data compression and behavior divergence measurement
- Human security of urban migrant populations affected by length of residence and environmental hazards
- Ecological security evaluation of Panjin city on town scale
- Getting Started in Cryptography and Cryptanalysis
- Roles: From Objects, Security and Database Perspective
- An intelligent based healthcare security monitoring schemes for detection of node replication attack in wireless sensor networks
- Artificial Intelligence Applications in Military Systems and Their Influence on Sense of Security of Citizens
- AHP integrated TOPSIS and VIKOR methods with Pythagorean fuzzy sets to prioritize risks in self-driving vehicles
- Security analysis of reversible logic cryptography design with LFSR key on 32-bit microcontroller
- The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments
- Security system development for “Smart House”
- SDN-based cyber defense: A survey
- SECURITY IMPROVEMENTS OF INTERNET OF THINGS SYSTEMS
- The International Security Alignment of Pacific Alliance’s Members with the United States: A Constructivist Realist Approach
- Safety Wing for Industry (SWI 2020)–An Advanced Unmanned Aerial Vehicle Design for Safety and Security Facility Management in Industries
- Security & Integrity in FHIR
- Privacy and Consent
- Systematic review and meta-analysis of global food security projections to 2050
- Android Malware Classification using Ensemble Classifiers
- Common Vulnerabilities Exposed in VPN–A Survey
- You shall not repackage! demystifying anti-repackaging on android
- Security-aware task scheduling with deadline constraints on heterogeneous hybrid clouds
- How to prepare for the onslaught of phishing email attacks
- A Comprehensive Study of IoT Security Risks in Building a Secure Smart City
- A Review on Cybersecurity Vulnerabilities for Urban Air Mobility
- Side Channel Assessment Platforms and Tools for Ubiquitous Systems
- Software Quality by Design Composition
- What we have here is failure to validate: Summer of LangSec
- Lightweight encryption technique to enhance medical image security on internet of medical things applications
- A state of art for smart gateways issues and modification
- Availability analysis of a permissioned blockchain with a lightweight consensus protocol
- A coupled human–natural system analysis of freshwater security under climate and population change
- An investigation of various applications and related security challenges of Internet of things
- Exploring reliable edge-cloud computing for service latency optimization in sustainable cyber-physical systems
- ADDRESSING SECURITY CHALLENGES IN EMBEDDED SYSTEMS AND MULTI-TENANT FPGAS
- Investigative Techniques for the De-Anonymization of Hidden Services
- Formal Verification of a Merge Sort Algorithm in SPARK
- A data-driven approach for online dynamic security assessment with spatial-temporal dynamic visualization using random bits forest
- Joint encryption and compression-based watermarking technique for security of digital documents
- Jazz (Hardcopy or e-book, with Total Access Registration Card)
- Security Evaluation of Smart Contract-based On-chain Ethereum Wallets
- Parciv: recognizing physical activities having complex interclass variations using semantic data of smartphone
- Secure Coding Guidelines
- Design and implementation of partition Operating System based on ARINC653 standard
- What changes in where? an empirical study of bug-fixing change patterns
- A Survey Paper on Machine Learning Approaches to Intrusion Detection
- Image Information Security
- Firewall Scheduling and Routing Using pfSense
- PLATYPUS: Software-based power side-channel attacks on x86
- Understanding information security policy violation from a situational action perspective
- A Public Platform for Virtual IoT-Based Monitoring and Tracking of COVID-19
- Security in Amazon Web Services
- Risk dynamics modelling of reservoir dam break for safety control in the emergency response process
- Research on facial expression recognition of video stream based on OpenCV
- Physical-Layer Security Improvement with Reconfigurable Intelligent Surfaces for 6G Wireless Communication Systems
- Kids security on social networks by face blur technique
- Measuring IoT Security Issues and Control Home Lighting System by Android Application Using Arduino Uno and HC-05 Bluetooth Module
- Modular Secured IoT Using SHAKTI
- Comprehensive survey of big data mining approaches in cloud systems
- A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms
- Modified adaptive neuro fuzzy inference system based load balancing for virtual machine with security in cloud computing environment
- Quantitative simulation of the water-energy-food (WEF) security nexus in a local planning context in indonesia
- Migration of existing software systems to mobile computing platforms: a systematic mapping study
- DADEM: Distributed Attack Detection Model Based on Big Data Analytics for the Enhancement of the Security of Internet of Things (IoT)
- Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
- Description of a Network Attack Ontology Presented Formally
- The short-term effects of COVID-19 outbreak on dietary diversity and food security status of Iranian households (A case study in Tehran province)
- Cybersecurity of Railway Network Management and Partitioning
- 5ECURITY 4EQUIREMENTS IN, ISTRIBUTED 5YSTEMS
- IoT Security Architecture with TEA for DoS Attacks Prevention
- Testing of EFFTRAN and Angle software in comparison to GEANT 4 simulations in gamma spectrometry of cylindrical and noncylindrical sample geometries
- Performance Evaluation of VLSI Implemented WSN Algorithms
- Interactive Security of Ransomware with Heuristic Random Bit Generator
- Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey
- A Compact FPGA-Based Accelerator for Curve-Based Cryptography in Wireless Sensor Networks
- Security symptoms
- Digital forensics explained
- Privacy Preserving Anti-forensic Techniques
- Post-Soviet Estonia’s information safety: lessons for Ukraine
- Computing Research Challenges in Next Generation Wireless Networking
- A new approach for security of wireless sensor networks based on anti-synchronization of the fractional-order hyper-chaotic system
- Datensicherheit (Security)
- An Ensemble Deep Neural Network Model for Onion-Routed Traffic Detection to Boost Cloud Security
- Secure Data Sharing Framework Based on Supervised Machine Learning Detection System for Future SDN-Based Networks
- Towards sustainable development: risk management for organizational security
- Detection of DoS, DDoS Attacks in Software-Defined Networking
- Advance Security and Challenges with Intelligent IoT Devices
- A study on e-commuting: Alleviating technical and mobility threats in a BYOD-enabled banking environment in Nigeria
- A Framework for Systematic Classification of Assets for Security Testing
- Mapping coercive institutions: The state security forces dataset, 1960–2010
- A Survey of Intelligent Techniques for Android Malware Detection
- The Agent Web Model: modeling web hacking for reinforcement learning
- As developing of Internet and Intranet Web browser-related application escalates, it is critical that the software engineers have complete logical models of …
- Integrated framework for incorporating sustainability design in software engineering life-cycle: An empirical study
- Towards a Robust and Trustworthy Machine Learning System Development
- Formalizing Open Source Software Quality Assurance Model by Identifying Common Features from Open Source Software Projects
- Source redundancy management and host intrusion detection in wireless sensor networks
- A Survey on Security and Privacy Issues in Contact Tracing Application of Covid-19
- Intelligent Cyber Defense in 5G Augmented Aviation Cybersecurity Framework
- nEnhancing Employees Information Security Awareness in Private and Public Organisations: A Systematic Literature Review
- The COVID-19 test of the United Nations Security Council
- Analysis of Ransomware, Methodologies Used by Attackers and Mitigation Techniques
- Fortifying Vehicular Security Through Low Overhead Physically Unclonable Functions
- Shopping for social security law in the EU
- A blockchain-based code copyright management system
- BuildCOM: automated auditing and continuous commissioning of next generation building management systems
- Livelihood Options and Livelihood Security Among Tribal in South Western Plateau and Highland Region in West Bengal
- Security and Privacy for Healthcare Blockchains
- Analysis of Inappropriate Usage of Cryptographic Primitives in Indian Mobile Financial Applications
- Multi-Language Spam/Phishing Classification by Email Body Text: Toward Automated Security Incident Investigation
- Barriers to drinking water security in rural Ghana: The vulnerability of people with disabilities
- Crosstalk: Speculative data leaks across cores are real
- Data Security Storage Method for Power Distribution Internet of Things in Cyber-Physical Energy Systems
- A preference-based approach to incorporate the” voice of the customer” in mass-market software product design
- Survey of Cryptography Algorithms for Sub-Saharan Countries
- Decentralized Actionable Cyber Threat Intelligence for Networks and the Internet of Things
- Impact of coronavirus pandemic crisis on technologies and cloud computing applications
- LIGHTWEIGHT PRETTY GOOD PRIVACY EMAIL ENCRYPTION
- Online Voting System Using Blockchain
- How Artificial Intelligence Can Undermine Security: An Overview of the Intellectual Property Rights and Legal Problems Involved
- Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
- Multiobjective Placement for Secure and Dependable Smart Industrial Environments
- End-to-End Data Architecture Considerations for IoT
- Security and Privacy in FinTech: A Policy Enforcement Framework
- Food Security Status among US Older Adults: Functional Limitations Matter
- Cryptographic Backdoors
- Machine learning for network application security: Empirical evaluation and optimization
- The role of attachment security in error self-monitoring: Is a social component necessary?
- Safety and security concerns at the beach: Views of migrant visitors in Ghana
- How Quantum Computers threat security of PKIs and thus eIDs
- Security Concerns and Privacy Preservation in Blockchain based IoT Systems: Opportunities and Challenges
- A critical Analysis of Cyber Security and Resilience in Nigeria
- Private military and security companies’ logos: Between camouflaging and corporate socialization
- Internet of things and ransomware: Evolution, mitigation and prevention
- Quantum Theory from Principles, Quantum Software from Diagrams
- Asset Security in Data of Internet of Things Using Blockchain Technology
- Integration of Blockchain and Remote Database Access Protocol-Based Database
- Knowledge Sharing Behavior in Homeland Security-The Roles of Trust, Technology, and Expectations
- Intelligent Security Performance Prediction for IoT-Enabled Healthcare Networks Using Improved CNN
- Security Information and Event Management Model Based on Defense-in-Depth Strategy for Vital Digital Assets in Nuclear Facilities
- An Inward Focus of Attention During Information Security Decision Making: Electrophysiological Evidence
- PROLISEAN: A New Security Protocol for Programmable Matter
- A systematic comparison of mobile Ad-hoc network security attacks
- Physical layer security: Authentication, integrity, and confidentiality
- Industrial Internet Development Strategies and Innovative Practices for Large Energy Corporation
- A systematic literature review on federated machine learning: From a software engineering perspective
- MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices
- Managing and Maintaining TYPO3
- Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs
- Light-Weight Key Establishment Mechanism for Secure Communication Between IoT Devices and Cloud
- Blockchain-Based Security Services for Fog Computing
- The phishing funnel model: A design artifact to predict user susceptibility to phishing websites
- ProDB: A memory-secure database using hardware enclave and practical oblivious RAM
- Security and Privacy Techniques in IoT Environment
- A Sharding Scheme based Many-objective Optimization Algorithm for Enhancing Security in Blockchain-enabled Industrial Internet of Things
- Motion detection using Passive Infrared Sensor using IoT
- A Novel Mechanism for Fraud Rank Detection in Social Networks
- Generating Informative CVE Description From ExploitDB Posts by Extractive Summarization
- Linux Software Encyclopedia
- Study on Security and Privacy of E-Government Service
- Securing Microservices on Cloud
- The ethical consequences of “going dark”
- Healthcare cyber-attacks and the COVID-19 pandemic: an urgent threat to global health
- URBAN AREAS AND WOMEN’S SECURITY: SMART-CITY PLANS IN BORDER CITIES (CASE STUDY: WESTERN KURDISTAN, IRAN)
- Onlooker effect and affective responses in information security violation mitigation
- Discovery and Deterrence of Black Hole Attack in Clustering Ad Hoc Networks Based on Software Agents
- SoK: Computer-aided cryptography
- PACStack: an Authenticated Call Stack
- Predicting security events using attention neural network
- Changing attitudes towards teletherapy in Austrian therapists during the COVID-19 pandemic
- Utilizing Data Analytics in the Field of Physical Security: An Exploratory Study
- FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications
- Research on Informatization Construction of Electric Power Communication Network under Smart Grid
- Security and Privacy of E-health Data
- Unifuzz: A holistic and pragmatic metrics-driven platform for evaluating fuzzers
- Blockchain-as-a-Service
- The adoption of homeland security initiatives in Texas police departments: A contextual perspective
- Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce
- Cryptanalysis Attacks and Techniques
- CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
- Risk, safety and security among visitors to Istanbul
- The Criminalisation of Tools Under the Computer Misuse Act 1990. The Need to Rethink Cybercrime Offences to Effectively Protect Legitimate Activities and Deter …
- Land Grab Practices and a Threat to Livelihood and Food Security in India? A Case Study from Aerocity Expansion Project from SAS Nagar, Punjab
- Research on intelligent operation and maintenance management method of enterprise IT
- Techniques Behind Smart Home Automation System Using NLP and IoT
- A system of quantities from software metrology
- Database Security Enhancement by Eliminating the Redundant and Incorrect Spelled Data Entries
- A Method for Assessing Threats to the Economic Security of a Region: A Case Study of Public Procurement in Russia
- How Developers Talk About Personal Data and What It Means for User Privacy: A Case Study of a Developer Forum on Reddit
- Design of a reference architecture for developing smart warehouses in industry 4.0
- Is food security an illusion for cities? A system dynamics approach to assess disturbance in the urban food supply chain during pandemics
- A leverage points perspective on institutions for food security in a smallholder-dominated landscape in southwestern Ethiopia
- Influence of precaution and dynamic post-indemnity based insurance policy on controlling the propagation of epidemic security risks in networks
- The HPCMP CREATE ™ Program management Model-Part I
- Classifying Common Vulnerabilities and Exposures Database Using Text Mining and Graph Theoretical Analysis
- Recent advances on industrial data-driven energy savings: Digital twins and infrastructures
- Cybersicherheit für automatisierte Fahrzeuge
- Efficient Data Security Using Hybrid Cryptography on Cloud Computing
- Creating a sense of digital privacy in the private sector
- The Current State of the Investment Environment in Ukraine and its Impact on the Investment Security of the State
- A New Paradigm for Outpatient Diagnosis and Treatment of Lower Urinary Tract Symptoms Utilizing a Mobile App/Software Platform and Remote and In-Office Visits: A …
- A leverage points perspective on institutions for food security in a smallholder-dominated landscape in southwestern Ethiopia
- A systematic literature review on technical debt prioritization: Strategies, processes, factors, and tools
- The Systemic Approach for Estimating and Strategizing Energy Security: The Case of Ukraine
- Industry 4.0 Interoperability, Analytics, Security, and Case Studies
- Task offloading for wireless VR-enabled medical treatment with blockchain security using collective reinforcement learning
- Farmland Fragmentation, Farmland Consolidation and Food Security: Relationships, Research Lapses and Future Perspectives
- The Effects of Needs for Security and Certainty on Economic Beliefs: The Role of Political Engagement and the Welfare State Model
- Security of 3D-printed polylactide acid piece sterilization in the operating room: a sterility test
- An Authenticated E-Voting System Using Biometrics and Blockchain
- The security field: Forming and expanding a Bourdieusian criminology
- 4 Cloud Security
- Characteristics associated with changes in food security status among college students during the COVID-19 pandemic
- A Framework for the Attack Tolerance of Cloud Applications Based on Web Services
- The role of data and information security governance in protecting public sector data and information assets in national government in South Africa
- Processing tweets for cybersecurity threat awareness
- Critical success factors to create 5G networks in the smart cities of India from the security and privacy perspectives
- Edge-based auditing method for data security in resource-constrained internet of things
- Technique for Enhancing the Robustness, Imperceptibility, and the Security of Digital Audio Watermarking
- Theft Security System for Automatic Teller Machines Using IoT
- Conceptual Framework for Deploying IoT in Digital Libraries: A systematic review of the entries
- Strengthening Pix CAPTCHA Using Trainlm Function in Backpropagation
- The Balance Between Security, Privacy and Data Protection in IoT Data Sharing: a Critique to Traditional” Security&Privacy” Surveys
- SecCAN: A Practical Secure Control Area Network for Automobiles
- A Multiobjective Model for Analysis of the Relationships between Military Expenditures, Security, and Human Development in NATO Countries
- A randomized controlled trial of three school meals and weekend food backpacks on food security in Virginia
- Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms
- SPD-Safe: Secure Administration of Railway Intelligent Transportation Systems
- Study of environmentally sustainable security in wireless sensor networks
- My SQL Bible
- Integrating the MCR and DOI models to construct an ecological security network for the urban agglomeration around Poyang Lake, China
- Giving semantics to program-counter labels via secure effects
- Conditioned integration during security crises: the role of Israeli sports media from 1996 to 2014
- Design network intrusion detection system using support vector machine
- Researching on AES Algorithm Based on Software Reverse Engineering
- Application Analysis of Artificial Intelligence in Library Network Security
- A low area VLSI implementation of extended tiny encryption algorithm using Lorenz chaotic system
- Mapping groundwater recharge in Africa from ground observations and implications for water security
- Study on Agent Architecture for Context-Aware Services
- User-Cell Association for Security and Energy Efficiency in Ultra-Dense Heterogeneous Networks
- Elderly’s food security and its associated socioeconomic determinants in Tehran: A cross-sectional study
- A Multi-Disciplinary Analysis of Catholic Social Teaching with Implications for Engineering and Technology
- PoC Testing Analysis of Big Data Products
- Enforcing situation-aware access control to build malware-resilient file systems
- Real-Time Human Locator and Advance Home Security Appliances
- SoK: Security and Privacy in the Age of Commercial Drones
- Countering Malicious Small Unmanned Aerial Systems: Understanding the Problem for Border Security
- Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics 2021, 9, 109
- A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
- Verilog Implementation of Biometric-Based Transmission of Fused Images Using Data Encryption Standards Algorithm
- Seismic performance evaluation of multi-story CBFs equipped with SMA-friction damping braces
- Exploring a Novel Strategy for Detecting Cyber-Attack by Using Soft Computing Technique: A Review
- Design Patterns and Best Practices
- The Contribution of Cereal Grains to Food Security and Sustainability in Africa: Potential Application of UAV in Ghana, Nigeria, Uganda, and Namibia
- Kandidatens navn: Jostein Tveit
- A review of 80 assessment tools measuring water security
- Data Security and Privacy Functions in Fog Computing for Healthcare 4.0
- Secure Server Virtualization Using Object Level Permission Model
- A Forecasting-Based DLP Approach for Data Security
- SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
- Domain-Specific IoT Applications
- Breaking Down and Reduplication of Information in Cloud for Best Overall Performance and Protection
- Malicious Traffic Classifier in android using Neural Networks
- SANS Institute
- Small States and the New Security Environment
- Access Control of Door and Home Security System
- Overview of the Security. Cryptography Namespace
- Deciding accuracy of differential privacy schemes
- Docker Security Analysis Mechanism with Linux Platform
- A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly
- Cloud Computing based Intelligent Bank Locker System
- Social Security, Medicare & Government Pensions: Get the Most Out of Your Retirement and Medical Benefits
- Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions
- AN IMPLEMENTAION OF SNORT BASED INTRUSION DETECTION SYSTEM USING WIRELESS SENSOR NETWORK
- COVID-19 pandemic cybersecurity issues
- Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]
- Reduce Cyber Security Vulnerabilities: Identity Layer
- SoFI: Security Property-Driven Vulnerability Assessments of ICs Against Fault-Injection Attacks
- Mitigating Cloud Computing Cybersecurity Risks Using Machine Learning Techniques
- A Quantum Leap in Microgrids Security: The Prospects of Quantum-Secure Microgrids
- 6G security challenges and potential solutions
- Application of ecosystem service flows model in water security assessment: A case study in Weihe River Basin, China
- A Study on Security Services and Threats in Cloud Computing
- Brightness attenuation mechanisms of Er3+ self-sensitized upconversion nanocrystals under 1.5 µm pumping
- Emerging ICT applications and services—Big data, IoT, and cloud computing
- Cybersecurity and the Digital-Health: The Challenge of This Millennium
- The architecture of computer hardware, systems software, and networking: An information technology approach
- Enabling data security in data using vertical split with parallel feature selection using meta heuristic algorithms
- Understanding employees’ information security identities: an interpretive narrative approach
- Developing a Blockchain-Based and Distributed Database-Oriented Multi-malware Detection Engine
- Making the Internet of Things Sustainable: An Evidence Based Practical Approach in Finding Solutions for yet to Be Discussed Challenges in the Internet of Things
- A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families Through Deep Neural Networks
- The “human factor” in cybersecurity: Exploring the accidental insider
- Optical network security management: requirements, architecture, and efficient machine learning models for detection of evolving threats
- Challenges in Firmware Re-Hosting, Emulation, and Analysis
- Door Security System Using e-KTP RFID Reading and Passive Infrared Sensor
- The Anti-Mercenary Norm and United Nations’ Use of Private Military and Security Companies: From Norm Entrepreneurship to Organized Hypocrisy
- Mlcapsule: Guarded offline deployment of machine learning as a service
- IoT Based Smart Farming Using Thingspeak and MATLAB
- Trusted Cooperative E-Learning Service Deployment Model in Multi-Cloud Environment
- Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence
- SMART CITIES, SECURITY AND URBAN CRIME CONTROL–Theories and Perspectives
- Towards Building Community Collective Efficacy for Managing Digital Privacy and Security within Older Adult Communities
- Sealing Porous Media through Calcium Silicate Reactions with CO2 to Enhance the Security of Geologic Carbon Sequestration
- Autonomous mitigation of cyber risks in the Cyber–Physical Systems
- Smart Contract Languages: A Multivocal Mapping Study
- Development of Smart U-Health Care Systems
- The Eco-label Blue Angel for Software—Development and Components
- Research on the game of network security attack-defense confrontation through the optimal defense strategy
- A Survey of Cyber Threats and Security Controls Analysis for Urban Air Mobility Environments
- A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education
- A NEW DISTRIBUTED DENIAL-OF-SERVICE DETECTION SYSTEM IN CLOUD ENVIRONMENT BY USING DEEP BELIEF NETWORKS
- Guarding the Gate
- Risk assessment of business models driven by Industry 4.0
- Study and Analysis of Test Case Prioritization Technique
- Hardware Trojan Attack in Embedded Memory
- Lightweight Cryptography Algorithms for Internet of Things enabled Networks: An Overview
- Espousal of Industry 4.0 in Indian manufacturing organizations: Analysis of enablers
- Small and Medium-Sized Enterprises in Rural Areas of the Czech Republic and Their Approach to Management Auditing
- The Social Life of the Women, Peace and Security Agenda: A Digital Social Network Analysis
- Digitalization and decentralization driving transactive energy Internet: Key technologies and infrastructures
- Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm
- Carbon and Nitrogen Footprints Management for Environmental and Food Security
- The role of the project manager in agile software development projects
- Security Analysis of SIMON32/64 Based on Deep Learning
- BAA Number: BAA98-02 Proposed Integration Role: RESEARCH OPERATING SYSTEMS
- Research and Application of Multipath Network Time Service System
- The Vehicle Model as a Controlled System
- Cloud Computing: Considering Trust as Part of the User Quality of Experience
- Is Machine Learning Software Just Software: A Maintainability View
- 2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Technical Program Committee Welcome
- A novel hyperchaotic image encryption system based on particle swarm optimization algorithm and cellular automata
- Systematic Literature Review: Research Collaboration and Social Software
- Cybersecurity of Industrial Cyber-Physical Systems: A Review
- Quality Assurance for AI-Based Systems: Overview and Challenges (Introduction to Interactive Session)
- On the Optimal Lawful Intercept Access Points Placement Problem in Hybrid Software-Defined Networks
- An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
- SDNStat-Sec: A Statistical Defense Mechanism Against DDoS Attacks in SDN-Based VANET
- A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware
- SEAPP: A secure application management framework based on REST API access control in SDN-enabled cloud environment
- Buying behaviour model of early adopting organizations of radical software innovations
- Resource allocation and trust computing for blockchain-enabled edge computing system
- Modelling security risk scenarios using subjective attack trees
- A unifying type-theory for higher-order (amortized) cost analysis
- A cluster randomized controlled trial of a home-delivered food box on food security in Chickasaw Nation
- New Features in C++ 20
- Demographic considerations and food security in Nigeria
- Secure and Scalable Collection of Biomedical Data for Machine Learning Applications
- A Product Pain-Pleasure Framework for Software Product Design in the Usability and User Experience Domains
- Impact of Coordination, Psychological Safety, and Job Security on Employees’ Performance: The Moderating Role of Coercive Pressure. Sustainability 2021, 13 …
- Assessment of Land Ecological Security and Analysis of Influencing Factors in Chaohu Lake Basin, China from 1998–2018
- Biden, National Security and Global Trade: Less Subterfuge and More Strategy in the Era of Crisis.
- Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids
- Sustainable value co-creation at the Bottom of the Pyramid: using mobile applications to reduce food waste and improve food security
- Emerging tools and paradigm shift of gene editing in cereals, fruits, and horticultural crops for enhancing nutritional value and food security
- Technology intervention to support caregiving for Alzheimer’s disease (I-CARE): study protocol for a randomized controlled pilot trial
- New opportunities in common security and defence policy: Joining PESCO
- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives
- Empirical analysis of transaction malleability within blockchain-based e-Voting
- The blockchain random neural network for cybersecure IoT and 5G infrastructure in smart cities
- Neurolaw: Advances in Neuroscience, Justice & Security
- Requirements capture and comparative analysis of open source versus proprietary service oriented architecture
- Implementation of a Hierarchical Embedded Cyber Attack Detection system for sUAS Flight Control Systems
- Development and Performance Testing of the Automated Building Energy Management System with IoT (ABEMS-IoT) Case Study: Big-Scale Automobile Factory
- Vancomycin Advanced Therapeutic Drug Monitoring: Exercise in Futility or Virtuous Endeavor to Improve Drug Efficacy and Safety?
- Security perception and people well-being
- Quantifying Uncertainty in Food Security Modeling
- Deep Learning-Based Logging Recommendation Using Merged Code Representation
- RAP Model—Enabling Cross-Layer Analysis and Optimization for System-on-Chip Resilience
- NATO’s evolving cyber security policy and strategy
- BD-D1Sec: Protocol of security authentication for BeiDou D1 civil navigation message based on certificateless signature
- Searchable Encryption
- Sustainable Management of IT Enterprises
- A comprehensive study of bloated dependencies in the maven ecosystem
- A randomized controlled trial measuring effects of extra Supplemental Nutrition Assistance Program (SNAP) benefits on child food security in low-income …
- Advances of ECG Sensors from Hardware, Software and Format Interoperability Perspectives
- Multilayer Self-Defense System to Protect Enterprise Cloud
- Faster and Secured Web Services Communication Using Modified IDEA and Custom-Level Security
- Designated-ciphertext searchable encryption
- Securing Biometric Framework with Cryptanalysis
- Data Visualization of 5G Speed Test Platform Using Tableau
- Enhanced IoV Security Network by Using Blockchain Governance Game
- Performance of deep learning vs machine learning in plant leaf disease detection
- Exploring role of moral disengagement and counterproductive work behaviours in information security awareness.
- A qualitative study of bereaved family caregivers: feeling of security, facilitators and barriers for rural home care and death for persons with advanced cancer
- Kubernetes Realizes the Cloud & Network Cooperation Based on Hardware SDN Controller
- Contribution of cassava and cassava-based products to food and nutrition security in Migori County, Kenya.
- A Novel Optimal Selection Algorithm for Agricultural Trade Export in Blockchain-Enabled Internet of Things
- Cloud Computing: The New World of Technology
- Multi-Perspectives of Cloud Computing Service Adoption Quality and Risks in Higher Education
- Networked Systems
- Customizing Health Security Preparedness Activities in Sub-Saharan Africa: Leveraging Political Context to Enhance IHR Implementation
- Optimal power flow with security operation region
- Process Changes
- Mobile Radio Communications and 5G Networks
- TECHNIQUES TO AVOID WEBCAM HACKING
- Vulnerability Assessment, Risk, and Challenges Associated with Automated Vehicles Based on Artificial Intelligence
- Regional Water Security
- Smart Power: The Global Competition for Cyber power and Capabilities
- Biosensor and Healthcare Vis-à-Vis Cloud Computing and IoT: Towards Sophisticated Healthcare Development—An Overview
- A Novel Discrete Firefly Algorithm for Constrained Multi-Objective Software Reliability Assessment of Digital Relay
- Consumer privacy during (and after) the COVID-19 pandemic
- A Neural Lyapunov Approach to Transient Stability Assessment in Interconnected Microgrids
- [TXT][TXT] New York, New York, July 1995
- Presenting a Model of Customer Experience Management in Mobile Banking Industry for Commercial Banks Customers in Dubai
- Detecting DDoS Attacks in IoT Environment
- Ferry Node Identification Model for the Security of Mobile Ad Hoc Network
- TRENDS IN DISTRIBUTED OBJECT COM-PUTING
- Empirical assessment of generating adversarial configurations for software product lines
- Security proof of practical quantum key distribution with detection-efficiency mismatch
- Optimal Artificial Neural Network Type Selection Method for Usage in Smart House Systems
- Digital Signature Authentication for a Bank Using Asymmetric Key Cryptography Algorithm and Token Based Encryption
- Learning to solve large-scale security-constrained unit commitment problems
- The Daily Life of Software Engineers during the COVID-19 Pandemic
- COSTE: Complexity-based OverSampling TEchnique to alleviate the class imbalance problem in software defect prediction
- A Physical Layer Security Enhancement Scheme under the Ambient Backscatter System
- The dual-use security dilemma and the social construction of insecurity
- Big Data for Smart Cities: A Case Study of NEOM City, Saudi Arabia
- Assessment of Land Ecological Security and Analysis of Influencing Factors in Chaohu Lake Basin, China from 1998–2018. Sustainability 2021, 13, 358
- Lattice-based Key-sharing Schemes: A Survey
- The Fundamentals and Potential for Cybersecurity of Big Data in the Modern World
- Pedagogías emergentes en ambientes virtuales de aprendizaje
- Challenges and opportunities in biometric security: A survey
- Review analysis on cloud computing based smart grid technology in the oil pipeline sensor network system
- Sustainability responses to climate-smart adaptation in Africa: implication for food security among farm households in the Central Region of Ghana
- A Novel Epidemic Model for Wireless Rechargeable Sensor Network Security
- A novel Dual-Blockchained structure for contract-theoretic LoRa-based information systems
- Smartphone Traffic Analysis: A Contemporary Survey of the State-of-the-Art
- Security Analysis and Protection for Charging Protocol of Smart Charging Pile
- Security region-based laminar flow coordinated optimization of grids
- Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction
- Android application behavioural analysis for data leakage
- Optimisation of cyber insurance coverage with selection of cost effective security controls.
- Blockchain-based authentication and authorization for smart city applications
- What matters for financial inclusions? Evidence from emerging economy
- Quantifying Uncertainty in Food Security Modeling. Agriculture 2021, 11, 33
- Security analysis and improvement of a quantum multi-signature protocol
- Opportunities and challenges in the collection and analysis of digital phenotyping data
- Exploiting If This Then That and Usage Control obligations for Smart Home security and management
- Advanced Key Management System (AKMS) for Security in Public Clouds
- CryptDICE: Distributed data protection system for secure cloud data storage and computation
- IoT and Cloud computing issues, challenges and opportunities: A review
- Attacks and Security Measures in Wireless Sensor Network
- Information support for crop production automation in Russia and Belarus
- Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers
- Analysis of Work Efficiency and Quality of Software Maintenance Using Cross-Company Dataset
- Advances of ECG Sensors from Hardware, Software and Format Interoperability Perspectives. Electronics 2021, 10, 105
- Lost in Zero Space–An Empirical Comparison of 0. yz Releases in Software Package Distributions
- Implementation of Real-Time Virtual Dressing Room Using Microsoft Kinect SDK and Supervised Learning
- Getting Started with Cryptanalysis
- Realization of Business Intelligence using Machine Learning
- A New Approach on Advanced Encryption Standards to Improve the Secrecy and Speed Using Nonlinear Output Feedback Mode
- A Robust Neutrosophic Modeling and Optimization Approach for Integrated Energy-Food-Water Security Nexus Management under Uncertainty
- ACPAR: A framework for linking national water and food security management with global conditions
- Cross-domain single sign-on authentication of information security in network environment
- Enabling Technologies for Fog Computing in Healthcare 4.0: Challenges and Future Implications
- Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
- Food availability and food and nutrition (in) security of families providing for the National School Feeding Program/A disponibilidade de alimentos ea (in) seguranca …
- Model-driven environment for configuration control and deployment of on-board satellite software
- Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability
- The globalization of artificial intelligence: consequences for the politics of environmentalism
- Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks
- Design and Implementation of Health Management for Modular Spacecraft Avionics System
- POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
- A Secure Data Sharing Using IDSS CP-ABE in Cloud Storage
- Toward a Knowledge-Based Model to Fight Against Cybercrime Within Big Data Environments: A Set of Key Questions to Introduce the Topic
- Performance Comparison of Various Techniques for Secure Data Communication in VANET
- Internet of Things System Using the Raspberry Pi to Monitor a Small-Scale Server Room
- BLOCKCHAIN: BASICS, APPLICATIONS, CHALLENGES AND OPPORTUNITIES
- Secure key-alternating Feistel ciphers without key schedule
- Safety, ISO 26262
- Within-person associations between attachment security, need satisfaction and psychological adjustment in daily life of older adults
- Flow length and size distributions in campus Internet traffic
- The AIQ meta-testbed: pragmatically bridging academic AI testing and industrial Q needs