Facet browsing currently unavailable
Page 3 of 4828 results
Sort by: relevance publication year
Physical layer security using stream cipher for LTE PROCEEDINGS ARTICLE published September 2015 in 2015 IEEE Bombay Section Symposium (IBSS) |
VGuard: A distributed denial of service attack mitigation method using network function virtualization PROCEEDINGS ARTICLE published November 2015 in 2015 11th International Conference on Network and Service Management (CNSM) |
A triple layer intrusion detection system for SCADA security of electric utility PROCEEDINGS ARTICLE published December 2015 in 2015 Annual IEEE India Conference (INDICON) |
On the use of security analytics for attack detection in vehicular ad hoc networks PROCEEDINGS ARTICLE published August 2015 in 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) |
Detection of Pilot Contamination Attack for Multi-Antenna Based Secrecy Systems PROCEEDINGS ARTICLE published May 2015 in 2015 IEEE 81st Vehicular Technology Conference (VTC Spring) |
A cooperative attack detection scheme for common control channel security in cognitive radio networks PROCEEDINGS ARTICLE published July 2015 in 2015 Seventh International Conference on Ubiquitous and Future Networks |
Traffic anomaly detection and DDOS attack recognition using diffusion map technologies PROCEEDINGS ARTICLE published September 2015 in 2015 Computer Science and Information Technologies (CSIT) |
Information security attack-defense research based on the military balance operation mechanism PROCEEDINGS ARTICLE published April 2015 in 2015 5th International Conference on Information Science and Technology (ICIST) |
Detection of MITM attack in LAN environment using payload matching PROCEEDINGS ARTICLE published March 2015 in 2015 IEEE International Conference on Industrial Technology (ICIT) |
Fast target link flooding attack detection scheme by analyzing traceroute packets flow PROCEEDINGS ARTICLE published November 2015 in 2015 IEEE International Workshop on Information Forensics and Security (WIFS) |
Improving deep neural networks based multi-accent Mandarin speech recognition using i-vectors and accent-specific top layer PROCEEDINGS ARTICLE published 6 September 2015 in Interspeech 2015 |
Adaptive physical layer security using code bank of sequences for CDMA PROCEEDINGS ARTICLE published March 2015 in 2015 IEEE Aerospace Conference |
Multi-Sensor d-GLMB Filter for Multi-Target Tracking using Doppler only Measurements PROCEEDINGS ARTICLE published September 2015 in 2015 European Intelligence and Security Informatics Conference |
Physical Layer Security in 5G Hybrid Heterogeneous Networks BOOK CHAPTER published 2019 in 5G Enabled Secure Wireless Networks |
Road and obstacle detection based on multi-layer laser radar in driverless car PROCEEDINGS ARTICLE published July 2015 in 2015 34th Chinese Control Conference (CCC) |
Predicting Cross-Site Scripting (XSS) security vulnerabilities in web applications PROCEEDINGS ARTICLE published July 2015 in 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE) |
Multi-Security Scheme Combining Chaotic Modulation and Masking using Acousto-Optic Feedback Devices PROCEEDINGS ARTICLE published 2015 in Frontiers in Optics 2015 |
Towards Autonomic DDoS Mitigation using Software Defined Networking PROCEEDINGS ARTICLE published 2015 in Proceedings 2015 Workshop on Security of Emerging Networking Technologies |
Islanding detection and transient over voltage mitigation using wireless sensor networks PROCEEDINGS ARTICLE published July 2015 in 2015 IEEE Power & Energy Society General Meeting |
Preventing fault attack on stream cipher using randomization PROCEEDINGS ARTICLE published May 2015 in 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) |