被诅咒的人 发表于 2025-3-23 12:02:06

Ephemeral Elliptic Curve Diffie-Hellman to Secure Data Exchange in Internet of Medical Thingsection. These attacks can compromise the privacy of the monitored patient, reduce the reliability of the monitoring system, and may harm the life of monitored patient. In this chapter, we propose a new framework to detect attacks and secure the communications in IoMT. To prevent eavesdropping and mo

Extricate 发表于 2025-3-23 17:27:30

http://reply.papertrans.cn/31/3085/308498/308498_12.png

FUME 发表于 2025-3-23 21:00:56

A Novel Transfer Learning Model for Intrusion Detection Systems in IoT Networksfective IoT attack detection model from both labelled and unlabelled data collected from multiple IoT devices. The proposed solution combines the Multi-Maximum Mean Discrepancy (M2D) distance and two AutoEncoder (AE) networks named as Multi-Maximum Mean Discrepancy AutoEncoder (M2DA). The first AE i

奖牌 发表于 2025-3-24 01:25:24

http://reply.papertrans.cn/31/3085/308498/308498_14.png

ESO 发表于 2025-3-24 06:02:27

Analysing the Threat Landscape Inside the Dark Webre agile algorithms to monitor the forums and to limit attacks. The methodology begins with a literature review, gap analysis and a research design using quantitative research methods such as comparative analysis of Dark Web forum datasets using data science techniques and an experimental research d

ODIUM 发表于 2025-3-24 09:55:51

http://reply.papertrans.cn/31/3085/308498/308498_16.png

Indelible 发表于 2025-3-24 14:39:29

http://reply.papertrans.cn/31/3085/308498/308498_17.png

dura-mater 发表于 2025-3-24 16:22:02

Improving Android Application Quality Through Extendable, Automated Security Testingity vulnerabilities to improve the apps’ development process, resulting in the overall improvement of the app ecosystem security both on the App Stores and on the end user’s devices. The source code of the system is available through a GitHub repository for public contribution.

悬挂 发表于 2025-3-24 23:05:44

A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment of data owners and data users in fog computing environment (IBPSC-SGG-FCE). The use of fog computing layer provides excellent response times, reliability, and enhanced privacy. H.EC enhances network computation efficiency. Formal security analysis is used to assess the toughness of security measure

忧伤 发表于 2025-3-25 00:42:49

rections where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses..978-3-031-09642-6978-3-031-09640-2
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Emerging Trends in Cybersecurity Applications; Kevin Daimi,Abeer Alsadoon,Nour El Madhoun Book 2023 The Editor(s) (if applicable) and The