Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 3 of 4828 results
Sort by: relevance publication year

Physical layer security using stream cipher for LTE

PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE Bombay Section Symposium (IBSS)

Authors: Preetha Pillai | Santoshi Pote

VGuard: A distributed denial of service attack mitigation method using network function virtualization

PROCEEDINGS ARTICLE published November 2015 in 2015 11th International Conference on Network and Service Management (CNSM)

Authors: Carol J. Fung | Bill McCormick

A triple layer intrusion detection system for SCADA security of electric utility

PROCEEDINGS ARTICLE published December 2015 in 2015 Annual IEEE India Conference (INDICON)

Authors: Rishabh Samdarshi | Nidul Sinha | Paritosh Tripathi

On the use of security analytics for attack detection in vehicular ad hoc networks

PROCEEDINGS ARTICLE published August 2015 in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)

Authors: Dhavy Gantsou

Detection of Pilot Contamination Attack for Multi-Antenna Based Secrecy Systems

PROCEEDINGS ARTICLE published May 2015 in 2015 IEEE 81st Vehicular Technology Conference (VTC Spring)

Authors: Jae-Mo Kang | Changdon In | Hyung-Myung Kim

A cooperative attack detection scheme for common control channel security in cognitive radio networks

PROCEEDINGS ARTICLE published July 2015 in 2015 Seventh International Conference on Ubiquitous and Future Networks

Traffic anomaly detection and DDOS attack recognition using diffusion map technologies

PROCEEDINGS ARTICLE published September 2015 in 2015 Computer Science and Information Technologies (CSIT)

Authors: Michael Zheludev | Evgeny Nagradov

Information security attack-defense research based on the military balance operation mechanism

PROCEEDINGS ARTICLE published April 2015 in 2015 5th International Conference on Information Science and Technology (ICIST)

Authors: Hongjun Tian | Dongsheng Yang | Lei Wang | Qidi Wu

Detection of MITM attack in LAN environment using payload matching

PROCEEDINGS ARTICLE published March 2015 in 2015 IEEE International Conference on Industrial Technology (ICIT)

Authors: Dawood Al Abri

Fast target link flooding attack detection scheme by analyzing traceroute packets flow

PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE International Workshop on Information Forensics and Security (WIFS)

Authors: Takayuki Hirayama | Kentaroh Toyoda | Iwao Sasase

Improving deep neural networks based multi-accent Mandarin speech recognition using i-vectors and accent-specific top layer

PROCEEDINGS ARTICLE published 6 September 2015 in Interspeech 2015

Authors: Mingming Chen | Zhanlei Yang | Jizhong Liang | Yanpeng Li | Wenju Liu

Adaptive physical layer security using code bank of sequences for CDMA

PROCEEDINGS ARTICLE published March 2015 in 2015 IEEE Aerospace Conference

Authors: Preetha Pillai | Shraddha Kharat | Chirag Warty | Shikha Nema | Susanna Spinsante

Multi-Sensor d-GLMB Filter for Multi-Target Tracking using Doppler only Measurements

PROCEEDINGS ARTICLE published September 2015 in 2015 European Intelligence and Security Informatics Conference

Authors: Francesco Papi

Physical Layer Security in 5G Hybrid Heterogeneous Networks

BOOK CHAPTER published 2019 in 5G Enabled Secure Wireless Networks

Authors: Anum Umer | Syed Ali Hassan

Road and obstacle detection based on multi-layer laser radar in driverless car

PROCEEDINGS ARTICLE published July 2015 in 2015 34th Chinese Control Conference (CCC)

Authors: Duan Jianmin | Zheng Kaihua | Shi Lixiao

Predicting Cross-Site Scripting (XSS) security vulnerabilities in web applications

PROCEEDINGS ARTICLE published July 2015 in 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE)

Authors: Mukesh Kumar Gupta | Mahesh Chandra Govil | Girdhari Singh

Multi-Security Scheme Combining Chaotic Modulation and Masking using Acousto-Optic Feedback Devices

PROCEEDINGS ARTICLE published 2015 in Frontiers in Optics 2015

Authors: Fares S. Almehmadi | Monish R. Chatterjee

Towards Autonomic DDoS Mitigation using Software Defined Networking

PROCEEDINGS ARTICLE published 2015 in Proceedings 2015 Workshop on Security of Emerging Networking Technologies

Authors: Rishikesh Sahay | Gregory Blanc | Zonghua Zhang | Herve Debar

Islanding detection and transient over voltage mitigation using wireless sensor networks

PROCEEDINGS ARTICLE published July 2015 in 2015 IEEE Power & Energy Society General Meeting

Authors: Alireza Eshraghi | Reza Ghorbani

Preventing fault attack on stream cipher using randomization

PROCEEDINGS ARTICLE published May 2015 in 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

Authors: Shamit Ghosh | Dipanwita Roy Chowdhury