1 |
Ensemble averaging deep neural network for botnet ...
|
2024 |
|
2 |
Decentralize transaction records of digital paymen...
|
2024 |
|
3 |
Decentralized Privacy-Preserving Solution Through ...
|
2024 |
|
4 |
Lightweight, Trust-Managing, and Privacy-Preservin...
|
2024 |
|
5 |
Collaborative Botnet Detection in Heterogeneous De...
|
2024 |
|
6 |
Mobile-based Vaccine Tracking System using Ethereu...
|
2024 |
|
7 |
Coordinated Attacks Detection Simulation With Deep...
|
2024 |
|
8 |
Penerapan dan Pelatihan Sistem Smart Aquaculture u...
|
2023 |
|
9 |
Rancang bangun Skema Autentikasi Biometric Palm Ve...
|
2023 |
|
10 |
Pelatihan Teknologi Metaverse untuk Siswa Program ...
|
2023 |
|
11 |
Integrated security information and event manageme...
|
2023 |
|
12 |
Customer satisfaction of urban farming application...
|
2022 |
|
13 |
LSTM-NB: DoS attack detection on SDN with P4 progr...
|
2022 |
|
14 |
Collaborative intrusion detection system for inter...
|
2022 |
|
15 |
Security system for digital land certificate based...
|
2022 |
|
16 |
Technology Readiness Index of Agricultural Extensi...
|
2022 |
|
17 |
Pemanfaatan dan Uji Kelayakan Teknologi Internet o...
|
2022 |
|
18 |
Pembangunan dan Sosialisasi Sistem Validasi Sistem...
|
2022 |
|
19 |
Randomness, uniqueness, and steadiness evaluation ...
|
2021 |
|
20 |
Secure MQTT PUF-Based Key Exchange Protocol for Sm...
|
2021 |
|
21 |
Electronic document authenticity verification of d...
|
2021 |
|
22 |
How Can National Identity Card Reduce Authenticati...
|
2021 |
|
23 |
Pendeteksian PHP vulnerabilities Menggunakan metod...
|
2020 |
|
24 |
Blacklisted IP distribution system to handle DDoS ...
|
2020 |
|
25 |
Sistem Pemantauan Kapasitas Sampah Berbasis IoT (S...
|
2020 |
|
26 |
Two factor authentication framework based on ether...
|
2020 |
|
27 |
Comparative analysis of K-nearest neighbor and dec...
|
2020 |
|
28 |
An Evidence-Based Technical Process for OpenFlow-B...
|
2020 |
|
29 |
Overhead Analysis of the Use of Digital Signature ...
|
2020 |
|
30 |
Mitigating Risk of IoT Sensing Data Error Using Pl...
|
2020 |
|
31 |
Security functional requirements for the developme...
|
2020 |
|
32 |
Context Awareness Adoption for Authentication Proc...
|
2020 |
|
33 |
How Can Fingerprint Improves the Payment Experienc...
|
2020 |
|
34 |
Multi-factor authentication using a smart card and...
|
2019 |
|
35 |
Quality of service (qos) comparison analysis of sn...
|
2019 |
|
36 |
Implementation of event-based dynamic authenticati...
|
2019 |
|
37 |
Adopting Fingerprint as an Authentication Factor o...
|
2019 |
|
38 |
Collaborative System for Friday Preacher Schedulin...
|
2019 |
|
39 |
Implementationn of Event-Based Dynamic Authenticat...
|
2019 |
|
40 |
Improving adaboost-based intrusion detection syste...
|
2019 |
|
41 |
Overhead analysis on the use of digital signature ...
|
2019 |
|
42 |
Improving the accuracy of fuzzy vault scheme in fi...
|
2019 |
|
43 |
Mitigation of Cryptojacking Attacks Using Taint An...
|
2019 |
|
44 |
Security document for smart parking gate based on ...
|
2019 |
|
45 |
Virtual Password Authentication Scheme in Hashed D...
|
2019 |
|
46 |
Analysis and classification of danger level in and...
|
2018 |
|
47 |
Peningkatan Akurasi Pendeteksian Serangan DDoS Men...
|
2018 |
|
48 |
Hardening the virtual password authentication sche...
|
2018 |
|
49 |
Increasing level of confidence of iris biometric m...
|
2012 |
|
50 |
How confident are you to counter uncertainty?
|
2012 |
|
51 |
Oil production optimization in a cluster of gas li...
|
2010 |
|
52 |
An effective crypto-biometric system for secure pa...
|
2009 |
|
53 |
Optimization of gas injection allocation in multi ...
|
2008 |
|
54 |
Authentication architecture based on crypto-biomet...
|
2008 |
|
55 |
An Investigation on Gas Lift Performance Curve in ...
|
2007 |
|