| 1 |
Web Penetration Testing Using Collaborative Multi-...
|
2025 |
|
| 2 |
Attack Detection on Edge IIOT Using Ensemble Learn...
|
2025 |
|
| 3 |
Distributed Denial-of-Service (DDoS) Detection Usi...
|
2025 |
|
| 4 |
Ensemble averaging deep neural network for botnet ...
|
2024 |
|
| 5 |
Decentralize transaction records of digital paymen...
|
2024 |
|
| 6 |
Decentralized Privacy-Preserving Solution Through ...
|
2024 |
|
| 7 |
Lightweight, Trust-Managing, and Privacy-Preservin...
|
2024 |
|
| 8 |
Collaborative Botnet Detection in Heterogeneous De...
|
2024 |
|
| 9 |
Mobile-based Vaccine Tracking System using Ethereu...
|
2024 |
|
| 10 |
Coordinated Attacks Detection Simulation With Deep...
|
2024 |
|
| 11 |
Benchmarking Machine Learning Algorithm for Routin...
|
2023 |
|
| 12 |
Simplification of Workflow-oriented Security Asses...
|
2023 |
|
| 13 |
Evaluation of Information Security Management in M...
|
2023 |
|
| 14 |
Smart Camping Management Asset using Frequent Patt...
|
2023 |
|
| 15 |
Adversary Simulation of Structured Query Language ...
|
2023 |
|
| 16 |
Electronic Medical Records (EMR) Using a Software ...
|
2023 |
|
| 17 |
Integrated security information and event manageme...
|
2023 |
|
| 18 |
Estimasi Utilisasi Prosesor pada Jaringan Interkon...
|
2022 |
|
| 19 |
Design of a Fogponics Farming System based on the ...
|
2022 |
|
| 20 |
Detection of Oxygen Levels (SpO2) and Heart Rate U...
|
2022 |
|
| 21 |
Collaborative intrusion detection system for inter...
|
2022 |
|
| 22 |
Digital Signature Method to Overcome Sniffing Atta...
|
2022 |
|
| 23 |
Security system for digital land certificate based...
|
2022 |
|
| 24 |
The Detection of Mirai Botnet Attack on the Intern...
|
2022 |
|
| 25 |
Implementasi Ethereum Blockchain dan Smart Contrac...
|
2021 |
|
| 26 |
Sniffing prevention in lora network using combinat...
|
2021 |
|
| 27 |
Mastitis Detection System in Dairy Cow Milk based ...
|
2021 |
|
| 28 |
Electronic document authenticity verification of d...
|
2021 |
|
| 29 |
Pendeteksian PHP vulnerabilities Menggunakan metod...
|
2020 |
|
| 30 |
Narrowband-IoT network for asset tracking system
|
2020 |
|
| 31 |
IoT object security towards on-off attack using tr...
|
2020 |
|
| 32 |
IoT Object Security towards the Sybil Attack Using...
|
2020 |
|
| 33 |
Blacklisted IP distribution system to handle DDoS ...
|
2020 |
|
| 34 |
Non-Line of Sight LoRa –Based Localization using...
|
2020 |
|
| 35 |
A performance analysis of general packet radio ser...
|
2020 |
|
| 36 |
Two factor authentication framework based on ether...
|
2020 |
|
| 37 |
Performance Analysis of Message Broker for Communi...
|
2020 |
|
| 38 |
Overhead Analysis of the Use of Digital Signature ...
|
2020 |
|
| 39 |
Monitoring Floating Solar Tracker based on Axis Co...
|
2020 |
|
| 40 |
WhatsApp Chat Visualizer: A Visualization of Whats...
|
2020 |
|
| 41 |
Internet of things platform for manage multiple me...
|
2019 |
|
| 42 |
Flatbuffers implementation on mqtt publish/subscri...
|
2019 |
|
| 43 |
Analysis of spreading factor variations on LoRa in...
|
2019 |
|
| 44 |
Overhead analysis on the use of digital signature ...
|
2019 |
|
| 45 |
Mitigation of Cryptojacking Attacks Using Taint An...
|
2019 |
|
| 46 |
Access control on internet of things based on publ...
|
2018 |
|
| 47 |
Monitoring Power Meter Pada Pembangkit Listrik Ten...
|
2018 |
|
| 48 |
Robust flood monitoring platform using message que...
|
2017 |
|