Abstract is missing.
- Message Fabrication Detection Model based on Reactive Protocols in VANETFadlallah Chbib, Walid Fahs, Jamal Haydar, Lyes Khoukhi, Rida Khatoun. 1-5 [doi]
- EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion DetectionFares Meghdouri, Maximilian Bachl, Tanja Zseby. 1-7 [doi]
- A Decentralized Resource Discovery Using Attribute Based Encryption for Internet of ThingsMohammed B. M. Kamel, YuPing Yan, Péter Ligeti, Christoph Reich. 1-3 [doi]
- Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network NodesMichal Pióro, Mariusz Mycek, Artur Tomaszewski. 1-8 [doi]
- Activation of LoRaWAN End Devices by Using Public Key CryptographyFredrik Mårlind, Ismail Butun. 1-8 [doi]
- Blockgraph: A blockchain for mobile ad hoc networksDavid Cordova, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle. 1-8 [doi]
- Unsupervised Machine Learning Techniques for Network Intrusion Detection on Modern DataMiel Verkerken, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck. 1-8 [doi]
- Privacy-Preserving Authentication Framework for UAS Traffic Management SystemsAnas Alsoliman, Abdulrahman Bin Rabiah, Marco Levorato. 1-8 [doi]
- Simplified Method for Fast and Efficient Incident Detection in Industrial NetworksKarel Kuchar, Radek Fujdiak, Petr Blazek, Zdenek Martinasek, Eva Holasova. 1-3 [doi]
- Cloud Assisted Privacy Preserving Using Homomorphic EncryptionKhalil Hariss, Maroun Chamoun, Abed Ellatif Samhat. 1-8 [doi]
- A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security FunctionsSara Farahmandian, Doan B. Hoang. 1-8 [doi]
- On Darknet HoneyBotsJoanna Moubarak, Carole Bassil. 1-3 [doi]
- Safe Traffic Adaptation Model in Wireless Mesh NetworksLyes Khoukhi, Rida Khatoun. 1-4 [doi]
- Detecting abnormal DNS traffic using unsupervised machine learningThi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Bruno Qu'hen. 1-8 [doi]
- A comparative performance study of cryptographic algorithms for connected vehiclesAbdessamad Fazzat, Rida Khatoun, Houda Labiod, Renaud Dubois. 1-8 [doi]
- Specific Anomaly Detection Method in Wireless Communication NetworksEva Holasova, Radek Fujdiak, Karel Kuchar. 1-3 [doi]