phishing peer-to-peer network security worms database and system security spam cryptographic protocols mobile virus web 2.0 security e-mail fraud ubiquitous computing security security ad hoc and sensor network security network and wireless network security security & network management network security e-mail security trojan protection intrusion detection and prevention internet security & applications session hijacking mim artificial intelligence hardware-based attacks machine learning ddos web based applications security of virtual machines services security intrusion detection blockchain technology crowd sourcing performance evaluations of protocols & security ap social networking machine learning for security replay attack authentication body-area networks cyber security replay attack etc home networks network management sensor network security blockchain privacy industrial control systems system security sdn autonomous vehicles cryptography vanets data mining trojan protectio deep learning wireless network security cryptocurrencies security and optimization internet of things (iot) secur electronic voting security cognitive security cloud computing security application neural networks big data encryption internet security & applicatio intrusion detection and preven trust internet of things e-mail fraud virus ad hoc and sensor network security peer-to-peer ne bioinformatics natural language processing wireless sensor networks trojan protection security threats & countermeasur network and wireless network security mobile information security manet network and wireless network s privacy challenges database fuzzy logic ) ubiquitous computing security web 2.0 security c security threats ad hoc and sensor netw cloud information retrieval computer vision steganography routing intrusion detection system security and privacy for iot connectivity and networking malware performance evaluations security threats & countermeasures detection security threats & countermeasures (ddos ontology iot applications and services aodv pattern recognition android • mobile • peer-to-peer network security key management • intrusion detection and prevention • e-mail security • virus • cryptographic protocols • ubiquitous computing security peer-to-peer text mining knowledge processing information extraction robotics cyber physical system (cps) attack aes internet security image encryption • performance evaluations of protocols & security image segmentation block cipher • web 2.0 security • security & network management • internet security & applications game theory • network and wireless network security internet of things (iot) cyber physical system network decryption iot cybersecurity classification attacks • database and system security wireless network ad hoc nlp substitution information hiding e-commerce hybrid intelligent systems dos resource provisioning fog performance evaluations of pro cloud security vanet ubiquitous computing cloud and grid computing for big data soft computing semantic processing data security web security morphology phonology security. permutation malicious node usability predictive learning data science electronics and signal processing for iot steganalysis ssl hash function qos random forest rsa malware detection denial of service smart grid password bayesian network iot-enabled innovation phishin entrepreneurship deployment scenarios parallel processing virtualization business intelligence electronics network protocols fuzzy systems mobile ad hoc networks wireless sensor network (wsn) signal processing for iot fog computing cryptosystem mobile ad-hoc networks ethereum optimization genetic algorithm biometrics udp flood grid icmp flood quantum cryptography machine learning and ai for big data malware analysis smart city anonymity trojon protection security techniques visualization hacking scanning array signal processing experimental results dynamic analysis wireless sensor network intrusion detection system (ids) machine learning algorithms data protection wimax kyoto2006+ dataset discrete fourier transform protocol chaotic system wsn generalized arnold map distributed denial of service watermarking symmetric key machine translation secret sharing threats data center network control access control lexical semantics chunking/shallow parsing biometric security elliptic curve cryptography key distribution iot-enabled innovation and entrepreneurship big data mining cooperation e-voting user identity blockchain scalability vpn block chain issues and trends secure routing firewall framework trust and privacy ch wireless networks and mobile computing question answering grid computing 3d and stereo imaging http flood attack syn flood manets digital image processing programming languages dns reflection or amplification attack information technology risk management • network and wireless network security • mobile mobile security ad hoc and sensor network security • peer-to-peer knowledge representation ai algorithms wireless ad hoc networks cyberattack visual cryptography group testing ddos attack chaos intrusion text steganography ns2 dsr mobile network intrusion detection systems verification forecasting mobile banking service oriented architecture mobile agent reputation-based confidentiality it security intrusion prevention mobile payment wlan secure cloud computing edge computer & network security social engineering spectral analysis denial of service attack data mining techniques vehicular forensics data blowfish authorization security properties benchmarks integrity risk mitigation tdes kleptography network forensics vulnerability assessment challenges internet signal processing color and texture penetration testing unfettered rules learning problems mapreduce collaborative environments trojan protection • security threats & countermeas multimedia & cognitive informa private key e-mail fraud • virus public key data visualization user authentication rsa algorithm denial-of-service attack rotor cipher quantum key distribution wormhole brute force attack honeypots trust management vanet attacks bro ids inventory device fingerprinting endpoint security twitter feature selection network protocols & wireless networks image processing natural language computing multimedia anomaly-based detection feature wearable technology wearable devices smartwatch wormhole routing broadcasting communication deadlock-free hamiltonian model 3-d mesh support vector machine blockchain authentication and authorization blockchain based security for the iot 5g and networks for big data multimedia etc big data applications consensus biometric authentication mobile authentication information centric network web authentication email spam m/g/r processor sharing queue trust determination trust-based routing protocols nwtd text-based captcha benchmark fuzzy logic. svm economics security management ecc cloud storage and file systems voip cybercrime reinforcement learning protocols intruders classifier methodology bluetooth performance evaluation device authentication initial trust social media device deployment unsw-nb15 experimental results and deployment scenarios text stenography python programming language critical infrastructures man-in-the-middle attack multi-layer encoding window function natural language prepossessing color space the mapping study intelligent system architectur entropy api calls carry select adder least significant bit (lsb) databases xor quantitative trait loci symmetric cryptography trusted third party cipher text ascii code psnr networking and architectures pox integrity. digital forensics topology discovery software defined network password handling smart card nlp and ai optical computing big data techniques packet flow ldap network performance edge & cognitive s kerberos v5 pervasive computation trust dual-port read-only memory computer science brute force attacks models and algorithms computer networks & communications bb84 protocol zigzag scanning security engineering network security. subliminal channel abnormal. ipsec trapdoors algorithms and applications nlp and machine learning frequent sequence mining covert channel network intrusion detection internal controls management secret key behavioural pattern sha-1 wireless theory of parallel / distributed computing decentralized trust management cpu ad hoc network cad design and testing software security cyber trust and security denial-of-service trust and privacy challenges anomaly mobile devices virtual machines wireshark spoken language processing software systems and technologies assessment survey covid-19 pandemic a digital certificate cryptocurrency exchange decision tree detection rate distributed denial-of-service (ddos) • theoretical computer science and algebra false alarm administrator appliance end-to-end security model els secure communication network defenses firewalls web server handlers sybil attack digital signature zero trust architecture connectivity • database mutual authentication mse • security threats & countermeasures bloom filter nsl-kdd sgd lea congestion control automation performance computing networks password. image classification mnist benchmark. shortest path smart cities python scapy kali linux de-authentication attack session key establishment security policy pairwise comparisons. logistic regression analytic hierarchy process k-nn naive bayes data hiding traceback manet(mobile adhoc network). access security controls markov-model cybersecurity culture crypto stream ciphers mitm attack rc4 blockchain attacks on existing systems fault tolerant key spoofing internet of thing big data search and mining i-voting electronic voting system plain text medical system metric availability dependency application-layer ddos attack browsing model error detection notification beacon security for grid computing seed model checking smartphone disaster random number generator tls henon map vulnerability shuffle vanet security and privacy approaches tools vanet adversaries and attackers security and privacy requirements in vanet exploit. information security. confusion diffusion. mix zone pseudonyms content management click spam web advertising google ads pay-per-click advertising apache spark wordpress attribute-base-access-control security analytics role-base-access-control network architectures feature extraction mobile networks & wireless lan bfmawddl bfcdnba usable security blockchain privacy ) • ubiquitous computing security • web 2.0 securi public-key cryptography training arithmetic coding cryptanalysis location privacy data description temporal sequence anomaly-based network intrusion detection system attacks & performance surveillance sniffing iot security okhttpclient healthcare cybersecurity httprequests mobile ip iot connectivity and networking incident response encryptions unavailability false alarms kdd cup 99 standard simulation device association decrypting risk principles management manage security programs encrypting mobile ad-hoc network smart vehicles dispute settlement elliptic curve interworking social networks & web 2.0 trust management public key cryptography lte umts imsi identity kvefs encrypt file system face fingerprint key-value store file system in user space (fuse) protocols. least significant bit matrix partition spatial domain pki image steganography ivote routing protocols reputation system bfma logistic map policy management distributed denial of service (ddos) reliability insider threat agent based trust management access control and intrusion detection authentication and identity management p2p dpa clusters and grid computing : security and role of security and privacy in mobile systems wddl security information systems architecture and desi esrm bf insider threats and countermeasures fair exchange protcocol wireless mesh networks securing windows maturation of a profession microsoft domain environment spectrum analysis matlab risk mechanism automated ids enterprise risk management local authentication protocols mobile cloud computing finger print authentication mitigation data analytics dmt dft neural languages common control channel challenge crahn multi-channel mac software engineering service discovery encryption\decryption pgp hmac data center swifi online social networks profile cloning computer network cloud service distributed computing shares greying effect key share. infrastructures for big data iqim dabechies4 interweaving flash crowds credits. mom wire antennas gain current distribution vswr fractal input impedance polarization resonant bgp protocol hashing. bmp image file lsb steganography agent based intrusion detection system (aids) black hole attack security plan small business risk planning parsing internet attacks knowledge base interoperability risk assessment healthcare privacy protection role-based access control xacml file upload video upload virtual system study material map reduce hadoop alert correlation data integrity data center network protection m echanism secret image sharing quadratic residues image coding data type data size cipher algorithms data density and encryption time gpu data & system integrity privacy and authentication cuda coefficient of variance denial of service (dos) netstat signal processing data storage the sleuth kit (tsk) mechatronics autopsy tcpview sparql n-triples owl rdf. k-means clustering recommender system frequent itemset energy efficiency decision making big data management syn flooding tcp sequence number attack cooperative transmission packet broadcast opportunistic large array mis quality digital signal processing physical layer encryption/decryption[2] caesar cipher[2] security protocol ns2[1] wireless networks wi-fi prognostic svm. mog-hmm rul aodv. false positive rate (fpr) erbium-doped fiber amplifier (edfa) gain adjustmen optical switch crosstalk all-optical network security emerging attack vectors security risks cross site scripting wired equivalent privacy (wep). wireless local area network (wlan) wardriving conditional entropy sql injection anomaly severity classification semantic evaluation multi-anomalies evaluation. ubiquitous mode of operation low-resource source code analysis unreleased resource path manipulation software vulnerabilities resource injection distributed ac ir circuit hvac temperature monitoring temperature control blue-tooth mix resource description framework(rdf) utm clinic energy-aware routing reasoning and evolution multipath routing qos routing application resource graphical password legitimate traffic. learning methods and analysis dll. llc media access control vn lstm knowledge-based authentication paas iaas& authentication 8 bits microcontroller ditributed denial-of-service attack ddisjunct matrix. non-adaptive group testing daugman canny sobel iris prewitt zero cross critical infrastructures. man-in-the-browser aran ndm smt vanet architecture pos tagging ariadne sead computerbased information system and pso. threshold cryptography anomaly severity evaluation quantitative evaluation internet casinos cyber defense botnets bgp network simulation tool ip falsifying idpf network-level security and protection visual information processing mobile code evolutionary computation multi-agent systems mobile agents intrusion detection system. porter stemmer stemming firewall policy exploring data analysis policy deployment hybrid random grids dct based steganography som multi-som certificate less cryptography 3gpp 4g security architecture linguistic resources rhetorical relations probability model extractive text summarization file systems text clustering markov random walk model des attribute reduction artificial neural network covert schemes security solutions pre-hacking signal identification peer-to-peer network embedded systems necessary information video signal processing gsm security nist dna shiftrows coefficient correlation smart contracts pairing based cryptography secret handshakes dynamic matching bilinear pairing multi-faceted model online social network updater identification application whitelisting service-oriented approach version control virtual password secure communication channel strong authentication shared secret session key scenario-based approach visualization and animation empirical evaluation key escrow management & interoperability method engineering threat modeling cloud software development security event management data correlation network dependency analysis googleglass blockchain in digital forensic big data analytics and social media historical response bloom filter. distributed denial-of-service attack particles swarm optimization. sensors radial basis function neural networks distributed ledger technology mansim. collective digital signature attack detection email classification brute-force attack mobile communication email fraud security and privacy static analysis adaptive neural network aco comprehensive evaluation lightweight k-nearest neighbour anomaly detection practical testing system avispa. industrial communication security network steganography real-time networking tcp/ip communications inspection game. agile programming waterfall methodology owasp braiding/entanglement multiple encryption rotation of the bits rfid payment certificate ccmp packet dropping attack hamming distance information flow tracking attribute-based encryption multiparty micropayment question answering (qa) functional call monitoring radius mobile adhoc network tkip semantic processing & nlp signal or image processing quality of service priority scheduling selfishness watch dog cognitive load clustering alert aggregation télécommunications credential software intellect learning. mediator oauth oix data integration openid digital identity shoulder surfing session passwords floating point number one time pad compression-crypto network density priori probability life time trust-based routing shared bitmap distributed rate control. bandwidth reservation medium accesscontrol rate limitation lan attack host based ids arp spoofing active detection connection failure behavior self-propagating malware dns poising shared register array mechanism message digest information theory routing protocol malware detection and mobile device. attack graph soa finite elements. biometrics; biometric fusion; face; fingerprint; c and services. networking naive bayesian classifier quadratic map tent map statistical hypothesis testing kolmogorov-smirnov test statistical test of significance queuing model poisson arrival buffer traffic flow secured watermark system (sws) and computer securi diffusion stage staffing 2-d arnold cat map db index. encryption and decryption algorithm for watermarki digital multimedia stage staffing watermarking http intrusion detection. copyright protection etc. event classification static and mobile wsn. node replication attack sybil physical cryptography physical unclonable functions computer enterprises security risk managemen network security; malware propagation modelling; b multi input multi output (mimo) protocol safety. anomaly-based intrusion detection system adhoc network smurf attacks. enterprises security risk management performance evaluation. wireless. ip spoofing modeling system dynamics delay. cdma throughput semantic intrusion detection application layer misuse detector fuzzy intrusion detection diffusion process and stream cipher. fuzzy cognitive mapping mobile ad hoc networking fuzzy neural network fuzzy c-means clustering workload characterization knowledge discovery in databases and privacy prese integrated verification. user authentication; group communication; secret s one-class support vector machine software implementation hdfs (hadoop distributed file system) content-addressable storage security non-invertible transformation cancellable biometrics fingerprint biometrics biohashing best practice it governance mapping pdca information security management systems (isms) iso 27001 information system. policy-driven security cobit nsgaii. objective functions symmetric cryptosystems non linearity s box memorability of passwords snakes & ladders game graphical passwords attackers . cryptographic algorithm. mac-layer threshold level j48. network security management complexity. ldpc codes chained codes system information leak data and grid room image video real time application cover media authentication & q-learning anti-spam email filtering rtos mobile ad hoc networks security conficker gpcode.ak password (information) snatching evasive/ deniable/ untraceable attacks little dragon cryptosystem electronic espionage threats big-dragon cryptosystem. electronic warfare threats cryptotrojan cryptovirus cryptovirology firewall systems design computer networks identity based firewalls malicious proposed method. noise categories wavelet thresholding image denoising false positive classification accuracy support vector machine (svm) hybrid intrusion detection system interactive education. secure routing protocol and bernoulli map attack tree in order to the rapid growth of the network applic it is necessary that this security concern must be new kinds of network attacks are emerging endlessl we propose a novel distributed intrusion detection usage control • security • internet security hash function [2]. encryption and decryption. customizable security. and matlab. and exemption. and public-key. system access control deviation detection distributed resource allocation asynchronous distributed pricing packet detection and packet header matching (phm) snort network intrusion detection system (nids) multivariate cryptography ad hoc and sensor secure network secure servers heterogeneous wireless network wake up receiver vlsi low power multigeneration keys. random kd (key distribution) sec-leach (secure leach) ieee 802.15.4 ieee 802.11b inter packet delay hybrid covert channel sensor networks leach (low energy adaptive clustering hierarchy) galois counter mode. link layer security no key-exchange dst quantum superposition state perl sub html regexpr fair exchange circular queue. file handler quantum networks md5 wave files. feedback lu matrix composition signature based detection behaviour based detection flow based detection c&c irc botnet key establishment intrusion detection / prevention systems signature formulation signature processing share n) visual cryptography (2 selfish nodes smart-card dfa coexistence multi-server low-cost cryptography node misbehaviour. malicious packet dropping controlled flooding reputation remote user masquerade attack password strength data value network security & identity privacy pareto-efficiency attack graph. efficient probabilistic packet marking algorithm probabilistic packet marking algorithm and crypt ography. online auction network byzantine behavior multicast communication ad-hoc networks hierarchical design ids tls protocol timers typing rhythms keystroke rangoli passwords implementation cost transposition cipher service differentiation. mb-ofdm interference limitation mobile ad hoc network (manet) sha-256 ip ao udt high speed bandwidth next generation network protocol desirability functions best practice frameworks baseline manuals risk analysis and management olsrv2 network security protocols information security controls signatures web services vulnerability analysis ip multimedia subsystem (ims) interpolation. qim identity based cryptography (ibc) m-ary modulation service authentication error concealment batch verification smartcard authentication. covert channel. diffie-hellman algorithm arithmetic encoding biometric information honeypot and nics. iptables network intrusion prevention np-complete quotient ring diophantine equation one-way function steganography; image segmentation; byte characteri cyber-defense. nonlinear function. handoff delay invisible digital watermarking pixel smart cards triangle routing remote user authentication attack games. eavesdroppers route optimization wireless body area networks niger-delta clustering routing cryptoviral extortion. clone audit system log analysis. selinux sensor network z-transform; frequency domain; watermarking; mean registration time. cellular automata crossover sha-512 hdl. threshold cryptography. finite fields & montgomery algorithm. ecc-3peke protocol undetectable online password guessing attack authorization and password. impersonation attack. packet loss sessionbased minutiae ann probabilistic encryption deniable encryption receipt-free rigging ip traceback content packet sniffers legal aspects zss signature. phonology and morphology addressing & location man data shredding avalanche confidence level lsb replacement steganography key sensitivity location coordinates ipfix flow scan detection cluster guard node iterations soft input mac addresses hash value. lu-cac caca bandwidth link utilization reliability. convolutional coding emergency response communication text passwords coercing judy array blom location-dependent social networks tunneling community consensus replica pragmatic web agent-based systems spatial reasoning computing with words uncertainty language-action perspective overlay and delay software configuration management clusters password replace ment vmware performance measurement network virtualization switching and addressing techniques self-organizin & privacy next generation internet & web architect longitudes usable security. latitudes central bank digital currency digital rupee smart banking survey domain analysis scoring benchmark http strict transport security shape representation text processing document recognition signal noise control victimization information emotion signal ciphers identification encryption modes hypergraphs cloud data security fine grained access group key management electronic payment hash chain symbolic machine learning security posture open-source erp software factors attributes measurement framework parsing/grammatical formalisms monetary policy socioeconomic impact peer-to-peer transactions fintech protection mechanism interactive education face recognition hdfs (hadoop distributed file cloud storage mobile computing context-aware computing smartwatches assessment fuzzy set theory accounting random forest algorithm pe header pe file higher education mobile education face and gesture feature engineering block ciphers encryption time cryptographic algorithm wormholes spread spectrum selective jamming detection models ensemble machine learning ddos attacks r360 web intelligence evolutionary computing ai in cyber security nids software defined networking network intrusion detection sy byte characteristic zss signature cyberdefense double spending cybercrime awareness cybercrime on social media education self-sovereign identity digital transformation software configuration managem public cloud severs data outsourcing pervasive/ubiquitous computing regulation and trust mechanism software-defined networks rerouting devices authentication big data analytics big data and iot application security awareness security behavior self-efficacy pre-processing alert prioritization alert clustering merging trellis coded genetic algorith session key matrix pseudo random key generator finite automata xperimental results ultrasonic audio voice activation hybrid analysis android banking trojans security threats & countermeas web and internet computing ontology and semantic web machine learning & application grid and scalable computing information technology trends bitwise-based hash split sketch principle component analysis victim identification ddos detection claims processing process improvement insurance security logs security metrics packet analyzer tcp network traffic dos attack secure division secure sum naive bayesian privacy preservation authentication scheme cryptography primitives password replacement sequence number monitoring agent side channel monitoring hooks system call constraint processing resource management ngns finding roots modulo. signing group group digital signature implementation technology power distribution social computing consensus mechanism signing group. difficult computational problems groupdigital signature land http flood tcp syn flood markov chain security issue smart devices incentive schemes. rewards federated learning incentive schemes high port application sinet port filtering data flow pipeline traffic patterns covid-19 related ioc prediction support parameter. k-means clustering algorithm detection model malicious javascript firmware db index cyber human behaviour stylometric analysis phishing email attack cyber-security security policies defense mechanisms employee awareness wimd cybersecurity wimd wireless implanted medical devices cardiac implanted device health belief model windows api calls. term frequency-inverse document frequency vectors n-gram analysis malware classification structural similarity index measurement (ssim). universal quality image (uqi) image fidelity (if) peak signal to noise ratio (psnr) mean square error (mse) frequency domain z-transform identity federation. limitations identity management federated identity management distributed system. information-centric internet-of-things. intelligent transportation system sensor network. etc mixture words nouns recall recognition user behavior optimal path big data tools and systems virtualization on platforms in the cloud data storage and management in cloud computing security techniques for the cloud virtual compute clusters system integration cloud based reference dna multilayer security indexing cipher dna cryptography filter design and structures signal reconstruction network layer security radar signal processing medical image analysis medical image processing ad hoc and sensor network multi input multi output (mimo smurf attacks electronics and signal process services salting techniques hash analysis security breaches threats and attacks lan passphrase a variant of covert channelworks similarly as netw the privacy. most of such attacksare devised using computer network is unpredictable due to informati iot devices. technical and security issues comparison. review mare sama software architecture microservices trojan. human factors end-user errors information systems cisco packet tracer cyber-attack nb. knn cnn offline signature recognition smart contracts. decentralized application added value applications enablers arxiv reddit stackexchange text classification topic modeling dst. internet of things (iot) security blockchain technology and cyber security we introduce new detection engine for hybrid cover convolutional neural network storage and retrieval coding and transmission anomaly-based intrusion detect protocol safety big data in cloud cloud management cloud storage for iot sensitive data insider attacks data leakage prevention (dlp) data access & protection micro medical processors knowledge instruction medical sensor network micro knowledge processors knowledge processors image analysis exploit packet delivery ratio throughput hdl network mapping nmap social clouds consolidation software defined networking (s patient empowerment ehr management blockchain in healthcare actuators neural network url phishing detection network cybersecurity techniques ipv4 exemption information system digital investigations digital forensics readiness digital evidence wireless medical networks ad-hoc on-demand distance vect mobile ad-hoc network (manet) one-class support vector machi sharing queue m/g/r processor operating systems computer architecture fake profiles xg boost multimedia data mining multimodal skew tent map interchange permutation eap-ttls inductive learning nlp and information retrieval and text mining web machine learning techniques bls signature secret sharing technique bi-variate polynomial security for emerging networks modelling cyber attacks tree bayes secure smart meter ambient intelligence social network analysis host-based intrusion detection network-based intrusion detect small-to-medium enterprises rough and fuzzy rough set hybrid and nonlinear system data and web mining automated machine learning programming models static testing tools openmp software testing exascale systems preferential attachment topolo model simulation data as a product (daap) privacy preserving pipelines dataprovenance memory safety verifiable observability capability-based security cheri webassembly security and optimization data cyber fraud fraud detection intrusion detection system (id gravitational search algorithm fuzzy physical hardware attacks network attacks attacks on data information fusion enterprises security pervasive computing wave files password complexity password length password security ht detection hardware trojans (ht) path selection test generation path delay fault (pdf) testing model interpretability explainable ai vanet security and privacy app vanet adversaries and attacker security and privacy requireme netlogo horizontal scalability direct acyclic distributed led gpt-4 graphcodebert codebert source code vulnerability powershell microphone security webcam security unauthorized access detection cybersecurity awareness ai-based security phishing prevention browser extensions malicious url detection media computing nft email users correlation log loss hot log live log insufficient logging soc siem countermeasures avispa industrial communication secu data management mobile networks semi-trusted third party fairness verifiability secret-sharing relieff algorithm email forensic dataset cybercrimes aquila optimization likability traceability software maintenance separation of concerns context-aware traffic light co traffic light control (tlc) requirements engineering (re) networks for big data encryption and decryption inspection game confusion matrix impersonation phishing attack computer security secured watermark system (sws) embedded system nosql data stores public safety crowd monitoring cctv cyberattack impact cyberattack types personal privacy economic stability cyberattacks saudi arabia parameters sensor node leach cluster head selection algorit optimistic multi-party computa trustworthiness autoencoder invertible mobile device intellect learning finite elements information retrieval and ai neural languages and nlp gitlab jenkins cve-2021-44228 ci/cd continuous delivery continuous integration dimensionality reduction educational data mining advanced persistent threats (a multi-vector attacks mesa security model stealth data exfiltration (sde sustainable agriculture water management dc water pump water & humidity sensors soil sensor vulnerability identification smart irrigation system semantic web conceptual modeling unsupervised machine learning j48 network control mansim crypto agreements blockchains smart grids real-time systems maintenance engineering production worms &trojan mobile clouds sla management machine learning and ai network traffic analysis asset inventory data classification cybersecurity frameworks threat intelligence zero-day vulnerabilities massive parallel sequencing forensic examinations bio-examinations deoxyribonucleic acid (dna) da particles swarm radial basis function computational linguistics distributed denial-of-service machine learning problems morphic computing q-learning mobile ad hoc networks securit big data and the cloud cloud computing architecture cloud business google glass stacked auto encoder explainable artificial intelli shapley additive explanation recurrent neural networks (rnn deep learning (dl) empirical studies vulnerabilities access control mechanisms anonymization techniques authentication mechanisms encryption techniques diffusion of innovation theory national security data privacy low carbon blockchain security key public cryptography argumentation mining subset sum coppersmith lattice reduction lattices snmp mib multi- agent distributed query processing location cloaking location based services windows registry forensics kdd cup 1999 dataset. which motivates many researchers to discover metho intrusion detection is one of the standard stages image cipher. scrambling key management protocols wireless attacks wireless intrusion detection system attack test cases attack taxonomy cueing. interfaces one-time passwords chosen ciphertext security. conditional proxy re-encryption proxy re-cryptography random oracle model noise & entropy anti obfuscation technique low level feature merkle-hellman. simultaneous diophantine sender mail server receiver mail server anti-spams wsn security cross layer architecture packet latency. benevolent node base station (bs) route trust (rt) indirect trust direct trust geometric mean (gm) device discovery physical proximity fidelity coordinate ratios equatorial cloning multimedia networking mobile & broadband wireless internet network based applications network operations & management measurement & performance analysis internet and web applications high speed networks adhoc and sensor networks heterogeneous wireless networks security standards security assessment business information security false positives true positives it policy common vulnerability exposure (cve) spam email security breach authentication and key agreement. umts security telecommunications system gsm system false alarm rate naive bayes classification multi stage filter enhanced adaboost compression. transformation threshold secret sharing public verifiable signcryption standard model provable security identity based cryptography signcryption embedded devices. modular exponentiation n-1 attack simple power analysis dominant feature set. outlier analysis behavioral profile terrorism social network analysis (sna) backtracking bit watch nodes traversed administrator field associative node ubiquitous computing security web 2.0 security cry corporate infrastructure disaster recovery data loss thematic analysis medical internet of things classification problem. svms functional analysis kernel functions legendre polynomials man-in-the-middle. obfuscation server less server based escrow less tree based hierarchical multicast group peer to peer fairness. ttp (trusted third party) security and privacy in pervasive/ubiquitous compu authentication and non-repudiation intrusion detection and vulnerability assessment untraceability cryptography and coding survivability intrusion resilience fault-tolerant networks diversity androidapis privilege escalation system call dependence graph behavior representation data compression. huffman coding isotropic cloning secure electronic transaction f8 a5/3 stream cipher unauthorized access network design real estate infrastructure security wireless sensor network. wireless mesh network wireless ad-hoc networks web application penetration testing security testing ) * ubiquitous computing security * trojon protection * security threats & cou e-mail fraud * virus ad hoc and sensor network security * peer- anti malicious objects star topology black scholes equations malicious object native language password textual password shape based authentication multicode encryption transversal designs reed-muller codes communication and quality control network system control charts anomalies ieee 802.11g multiple encryption. arabic text (ddos response & tracking. base station sensor nodes attack path reconstruction ddos-attacks icap client honeypot browser vulnerability adhoc on demand distance vector protocol(aodv) translation. elecronic voting user lifecycle workflows provisioning security synthesis information theoretic security rational secret sharing fault tolerance topology. authenticated symmetric key establishment biometric key wireless body sensor network (wbsn) ofdm spectrum sensing inter symbol interference (isi) cognitive radio mpi. encrypted data international data encryption algorithm (idea) hiding information unicode multi-layers e-risks e-learning secret reference matrix (srm) peak-signal-to-noise-ratio (psnr) discrete cosine transformed (dct) botnet and honeypot. iptrcing flooding attack internet threat monitors (itm) • peer to peer and overlay networks • optical networks and systems • next generation web architectures • measurement & performance analysis • internet and web applications • high speed networks • adhoc and sensor networks • next generation internet quantum copying machines eavesdropping todv cross layer detection body area network security body area networks misbehaving node tbraodv ad-hoc isakmp dsss • network enterprise machinelearning information gain e-learning security e-remedies geometry • computational complexity • automata theory • algorithms and data structures e-mail architecture header analysis e-mail headers e-mail forensics feature coding pca ca certification authority &security chebyshev polynomials blind signature friendly-cooperative framework system hardening • heterogeneous wireless networks fair exchange protocols fair document exchange dempster–shafer belief theory hashcode hacker websites • quantum computation • program semantics and verification • probabilistic computation • parallel and distributed computing • natural language processing • cryptography • computational science and applications • machine learning • information theory • computational physics & biology data outsourcing; privacy; public cloud severs; ac background removal x64 systems neighbour mean interpolation image interpolation operation system simulator emulator web filtering collaborative web systems vector valued functions privacy preserving implicit function theorem hitech act hipaa incident response team cyber incidents ecurity threats & countermeasures (ddos hybrid idps perimeter-based idps network-based idps host-based idps idps sensors/agents tcp re-assembly cyber-crime & bdi. vendor lock-in csp multi-cloud feature selection. keystroke dynamics. biometric web-based fuzzy-c means clustering background subtraction foreground detection attacks prediction threat activity. cyberattack ontology cyberattack prediction network and wireless network securitymobile iot security and privacy blockchain new design blockchain consensus algorithms blockchain foundations blockchain-based security for the iot iot experimental results and deployment scenarios security & network management e-mail security multimedia etc big data tools and systems big data privacy and trust big data applications models and algorithmsbig data infrastructure and p big data big data techniques peer-to-peer network security database and system network applications emerging technologies for next generation network discrete algorithms and discrete modeling network operation and management mobile and wireless networks network security and privacy communication network protocols communication network architectures and design features. mlp filtering. enron keyword search report generation digital forensic email forensic cassandra big data. database & information retrieval image signal processing networks & fuzzy system dns poising. legal. regulation protection personal law general trust in service-oriented architecture- open archi and nist statistical tests matlab simulation chaotic algorithms images security hash function [2] open application xml-dsig cluster head risk and threats bayesian belief network malware propagation modelling shifting shifting. sprase svd (ssvd) singular value decomposition (svd) multimodal authentication exponential kronecker product (ekp) kronecker product context-sensitive exponent associative memory mode biometric fusion information theor engineering cybernetics decision support system multimedia & telecommunications conditional random fields layered approach secure two-party computation zero-knowledge proof distributed eigamal encryption similarity coefficients vanet etc. v2v stdma csma packet marking autonomous system sensing layer resonant frequency micro cantilever dynamic source routing. network coding ws-security soap httpi https http signature-based misuse detection architecture agent trojan protectionstem security database and syvirus strong t -consistency group communication server security small business security e-commerce systems security mobile phones data and grid room network security & its applications pki interoperability cross-certification certificate practice statement(cps) certificate policy(cp) certification authority(ca) public key infrastructure(pki) ngn ec-aka aka eps lte security • intelligent agents and systems • trust management • privacy and authentication • cryptography and coding security and privacy policies mobile ad hoc network spammers web spam redirection manipulating search engine search engine hiding techniques cloaking detection database and system security intrusion detection a lucas digital signatures fair-exchange contract signing andit security protected health information personal identification information information assurance low-power improved watchdog watchdog security area control regulation and trust mechanisms biological and evolutionary computation reinforcement and unsupervised learning ) • ubiquitous computing security engineering search engine optimization malicious websites intrusion detection and prevention internet securi counterfeit. and machine learning knime aes. session based key security in distributed systems artificial immune systems computational intelligence in security multiple flows tcp protocols high-speed heterogeneous networks. next generation networks casper/fdr authentication and key agreement protocols heart rate device gps emergency arduino microcontroller accelerometer accidents hierarchical model trust management for virtual organizations policy of trust in e-leaning systems trust and reputation management mobile and sensor networks trust/risk based security frameworks trust management system for wireless certificateless public key encryption certificateless signature scheme digital certificate certificateless public key cryptography set protocol fuzzy logic & perspective of intrusions association mining temporal sequence patterns ubiquitous computing security web 2.0 security olsr willingness function system information leak peer to peer and overlay networks qos and resource management dos attacks ndp fragment header flow-label ipv6 security vulnerability remote authentication man in the middle attack user authentication framework analysis dynamic billing system data aggregation distributed hash tables & linear diophantine decentralized network multimedia content management bit error rate(ber) ecb and cfb cryptographic algorithm pre-zf pre-mmse mimo-ofdm peerto-peer network. intrusion attacks taxonomy of attack intruder maximum power transfer electronic circuit control system touch sensor communication technologies mobile & wireless networks lowest id clustering algorithm sybil node smrr blockchainbased security for the iot blockchainauthentication and authorization analyze formal timestamps nonce pkm informtaion technology safety response time self-configuration self-cure self-protection self-optimization autonomic network clustering technique awgn and raleigh fading channels. sbskct
Ver más