skip to main content
Language:
Primo Advanced Search
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search prefilters

Results 1 - 20 of 72  for All Library Resources

Results 1 2 3 4 next page
Refined by: resource type: Standards remove subject: Security remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Visualizing Anti-Patterns in Microservices at Runtime: A Systematic Mapping Study
Material Type:
Standards
Add to My Research

Visualizing Anti-Patterns in Microservices at Runtime: A Systematic Mapping Study

Access, IEEE, 2023, Vol.11, p.4434-4442

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3236165

Full text available

2
FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks
Material Type:
Standards
Add to My Research

FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks

Access, IEEE, 2023, Vol.11, p.4549-4573

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3235900

Full text available

3
DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity
Material Type:
Standards
Add to My Research

DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity

Access, IEEE, 2020, Vol.8, p.192587-192596

2013 IEEE ;DOI: 10.1109/ACCESS.2020.3030241

Full text available

4
A Complex Event Processing-Based Online Shopping User Risk Identification System
Material Type:
Standards
Add to My Research

A Complex Event Processing-Based Online Shopping User Risk Identification System

Access, IEEE, 2019, Vol.7, p.172088-172096

2013 IEEE ;DOI: 10.1109/ACCESS.2019.2955466

Full text available

5
Modeling of Blockchain Assisted Intrusion Detection on IoT Healthcare System Using Ant Lion Optimizer With Hybrid Deep Learning
Material Type:
Standards
Add to My Research

Modeling of Blockchain Assisted Intrusion Detection on IoT Healthcare System Using Ant Lion Optimizer With Hybrid Deep Learning

Access, IEEE, 2023, Vol.11, p.82199-82207

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3299589

Full text available

6
Decentralized Model to Protect Digital Evidence via Smart Contracts Using Layer 2 Polygon Blockchain
Material Type:
Standards
Add to My Research

Decentralized Model to Protect Digital Evidence via Smart Contracts Using Layer 2 Polygon Blockchain

Access, IEEE, 2023, Vol.11, p.83289-83300

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3302771

Full text available

7
Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications
Material Type:
Standards
Add to My Research

Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications

Access, IEEE, 2023, Vol.11, p.81205-81223

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3300220

Full text available

8
Reputation-Aware Relay Selection With Opportunistic Spectrum Access: A Blockchain Approach
Material Type:
Standards
Add to My Research

Reputation-Aware Relay Selection With Opportunistic Spectrum Access: A Blockchain Approach

Vehicular Technology, IEEE Open Journal of, 2023, Vol.4, p.389-403

2020 IEEE ;DOI: 10.1109/OJVT.2023.3263804

Full text available

9
An Intelligent Buffalo-Based Secure Edge-Enabled Computing Platform for Heterogeneous IoT Network in Smart Cities
Material Type:
Standards
Add to My Research

An Intelligent Buffalo-Based Secure Edge-Enabled Computing Platform for Heterogeneous IoT Network in Smart Cities

Access, IEEE, 2023, Vol.11, p.69282-69294

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3288815

Full text available

10
An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks
Material Type:
Standards
Add to My Research

An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks

Access, IEEE, 2022, Vol.10, p.110136-110148

2013 IEEE ;DOI: 10.1109/ACCESS.2022.3211653

Full text available

11
A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET
Material Type:
Standards
Add to My Research

A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET

Access, IEEE, 2022, Vol.10, p.95321-95343

2013 IEEE ;DOI: 10.1109/ACCESS.2022.3204271

Full text available

12
Attack Detection for Medical Cyber-Physical Systems-A Systematic Literature Review
Material Type:
Standards
Add to My Research

Attack Detection for Medical Cyber-Physical Systems-A Systematic Literature Review

Access, IEEE, 2023, Vol.11, p.41796-41815

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3270225

Full text available

13
An Efficient Trust Management Technique Using ID3 Algorithm With Blockchain in Smart Buildings IoT
Material Type:
Standards
Add to My Research

An Efficient Trust Management Technique Using ID3 Algorithm With Blockchain in Smart Buildings IoT

Access, IEEE, 2023, Vol.11, p.8136-8149

2013 IEEE ;DOI: 10.1109/ACCESS.2022.3230944

Full text available

14
High-Rate Secret Key Generation Using Physical Layer Security and Physical Unclonable Functions
Material Type:
Standards
Add to My Research

High-Rate Secret Key Generation Using Physical Layer Security and Physical Unclonable Functions

Communications Society, IEEE Open Journal of the, 2023, Vol.4, p.209-225

2020 IEEE ;DOI: 10.1109/OJCOMS.2023.3234338

Full text available

15
5G Multi-Access Edge Computing: A Survey on Security, Dependability, and Performance
Material Type:
Standards
Add to My Research

5G Multi-Access Edge Computing: A Survey on Security, Dependability, and Performance

Access, IEEE, 2023, Vol.11, p.63496-63533

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3288334

Full text available

16
A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences
Material Type:
Standards
Add to My Research

A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences

Access, IEEE, 2023, Vol.11, p.29101-29115

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3261133

Full text available

17
Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System
Material Type:
Standards
Add to My Research

Block Cipher Nonlinear Confusion Components Based on New 5-D Hyperchaotic System

Access, IEEE, 2021, Vol.9, p.87686-87696

2013 IEEE ;DOI: 10.1109/ACCESS.2021.3090163

Full text available

18
Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things
Material Type:
Standards
Add to My Research

Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things

Access, IEEE, 2021, Vol.9, p.21267-21278

2013 IEEE ;DOI: 10.1109/ACCESS.2021.3055148

Full text available

19
A Novel Artificial Spider Monkey Based Random Forest Hybrid Framework for Monitoring and Predictive Diagnoses of Patients Healthcare
Material Type:
Standards
Add to My Research

A Novel Artificial Spider Monkey Based Random Forest Hybrid Framework for Monitoring and Predictive Diagnoses of Patients Healthcare

Access, IEEE, 2023, Vol.11, p.77880-77894

2013 IEEE ;DOI: 10.1109/ACCESS.2023.3297957

Full text available

20
CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems
Material Type:
Standards
Add to My Research

CephArmor: A Lightweight Cryptographic Interface for Secure High-Performance Ceph Storage Systems

Access, IEEE, 2022, Vol.10, p.127911-127927

2013 IEEE ;DOI: 10.1109/ACCESS.2022.3227384

Full text available

Results 1 - 20 of 72  for All Library Resources

Results 1 2 3 4 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Refine My Results

Creation Date 

From To
  1. Before 2019  (1)
  2. 2019 To 2019  (5)
  3. 2020 To 2020  (6)
  4. 2021 To 2022  (30)
  5. After 2022  (31)
  6. More options open sub menu

Searching Remote Databases, Please Wait