-
1
-
-
84988961117
-
A cloud-based energy efficient system for enhancing the detection and prevention of modern malware
-
Crans-Montana
-
Mirza, Q.K.A., Mohi-Ud-Din, G., Awan, I., A cloud-based energy efficient system for enhancing the detection and prevention of modern malware. 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), 2016, 754–761 Crans-Montana.
-
(2016)
2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)
, pp. 754-761
-
-
Mirza, Q.K.A.1
Mohi-Ud-Din, G.2
Awan, I.3
-
2
-
-
84980043247
-
Coping with denial-of-service attacks on the IP telephony system
-
Norfolk, VA
-
Cadet, F., Fokum, D.T., Coping with denial-of-service attacks on the IP telephony system. SoutheastCon 2016, 2016, 1–7 Norfolk, VA.
-
(2016)
SoutheastCon 2016
, pp. 1-7
-
-
Cadet, F.1
Fokum, D.T.2
-
3
-
-
85010380352
-
Implementing intrusion management as security-as-a-service from cloud
-
Bangalore
-
Sharma, D.H., Dhote, C.A., Potey, M.M., Implementing intrusion management as security-as-a-service from cloud. 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2016, 363–366 Bangalore.
-
(2016)
2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
, pp. 363-366
-
-
Sharma, D.H.1
Dhote, C.A.2
Potey, M.M.3
-
4
-
-
85071446498
-
In search of effective honeypot and honeynet systems for real-time intrusion detection and prevention
-
ACM New York, NY, USA
-
Olagunju, Amos O., Samu, Farouk, In search of effective honeypot and honeynet systems for real-time intrusion detection and prevention. Proceedings of the 5th Annual Conference on Research in Information Technology (RIIT '16), 2016, ACM, New York, NY, USA, 41–46.
-
(2016)
Proceedings of the 5th Annual Conference on Research in Information Technology (RIIT '16)
, pp. 41-46
-
-
Olagunju, A.O.1
Samu, F.2
-
6
-
-
84980048143
-
A process to transfer Fail2ban data to an adaptive enterprise intrusion detection and prevention system
-
Norfolk, vol. A
-
Ford, M., et al. A process to transfer Fail2ban data to an adaptive enterprise intrusion detection and prevention system. SoutheastCon 2016, 2016, 1–4 Norfolk, vol. A.
-
(2016)
SoutheastCon 2016
, pp. 1-4
-
-
Ford, M.1
-
8
-
-
84988024934
-
Pattern matching intrusion detection technique for Wireless Sensor Networks
-
Chennai
-
Kalnoor, G., Agarkhed, J., Pattern matching intrusion detection technique for Wireless Sensor Networks. 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-informatics (AEEICB), 2016, 724–728 Chennai.
-
(2016)
2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-informatics (AEEICB)
, pp. 724-728
-
-
Kalnoor, G.1
Agarkhed, J.2
-
9
-
-
84997354223
-
Intrusion detection and prevention system using K-learning classification in cloud
-
New Delhi
-
Kumawat, S., Sharma, A.K., Kumawat, A., Intrusion detection and prevention system using K-learning classification in cloud. 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016, 815–820 New Delhi.
-
(2016)
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)
, pp. 815-820
-
-
Kumawat, S.1
Sharma, A.K.2
Kumawat, A.3
-
10
-
-
85051000752
-
-
D. Sgandurra; G. Dini; F. Martinelli, “MADAM: effective and efficient behavior-based android malware detection and prevention,” in IEEE Transactions on Dependable and Secure Computing,vol.PP, no.vol. 99, pp.1–1.
-
A. Saracino; D. Sgandurra; G. Dini; F. Martinelli, “MADAM: effective and efficient behavior-based android malware detection and prevention,” in IEEE Transactions on Dependable and Secure Computing,vol.PP, no.vol. 99, pp.1–1.
-
-
-
Saracino1
, A.2
-
11
-
-
84963966482
-
A network defense system for detecting and preventing potential hacking attempts
-
Kota Kinabalu
-
Alsunbul, S., Le, P., Tan, J., Srinivasan, B., A network defense system for detecting and preventing potential hacking attempts. 2016 International Conference on Information Networking (ICOIN), 2016, 449–454 Kota Kinabalu.
-
(2016)
2016 International Conference on Information Networking (ICOIN)
, pp. 449-454
-
-
Alsunbul, S.1
Le, P.2
Tan, J.3
Srinivasan, B.4
-
13
-
-
84983517133
-
Balancing delays and energy consumption in IPS-enabled networks
-
Crans-Montana
-
Merlo, A., Migliardi, M., Spadacini, E., Balancing delays and energy consumption in IPS-enabled networks. 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2016, 267–272 Crans-Montana.
-
(2016)
2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
, pp. 267-272
-
-
Merlo, A.1
Migliardi, M.2
Spadacini, E.3
-
14
-
-
85051034310
-
Privacy protection and intrusion avoidance for cloudlet-based medical data sharing
-
In press
-
Chen, M., Qian, Y., Chen, J., Hwang, K., Mao, S., Hu, L., Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Transactions on Cloud Computing, 2007 In press.
-
(2007)
IEEE Transactions on Cloud Computing
-
-
Chen, M.1
Qian, Y.2
Chen, J.3
Hwang, K.4
Mao, S.5
Hu, L.6
-
15
-
-
85040169560
-
Intrusion detection and prevention for ZigBee-based home area networks in smart grids
-
In press
-
Jokar, P., Leung, V., Intrusion detection and prevention for ZigBee-based home area networks in smart grids. IEEE Transactions on Smart Grid, 2017 In press.
-
(2017)
IEEE Transactions on Smart Grid
-
-
Jokar, P.1
Leung, V.2
-
17
-
-
85006934355
-
Intelligent intrusion prevention system for households based on system-on-chip computer
-
Vancouver, BC
-
Rashid, M.T., Abir, I.K., Shourove, N.S., Muntaha, R., Rhaman, M.K., Intelligent intrusion prevention system for households based on system-on-chip computer. 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2016, 1–5 Vancouver, BC.
-
(2016)
2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
, pp. 1-5
-
-
Rashid, M.T.1
Abir, I.K.2
Shourove, N.S.3
Muntaha, R.4
Rhaman, M.K.5
-
18
-
-
85025156351
-
Intrusion Filtration System(IFS)-mapping network security in new way
-
Paralakhemundi
-
Dewanjee, R., Intrusion Filtration System(IFS)-mapping network security in new way. 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016, 527–531 Paralakhemundi.
-
(2016)
2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES)
, pp. 527-531
-
-
Dewanjee, R.1
-
19
-
-
85027548293
-
The security of RFID readers with IDS/IPS solution using Raspberry Pi
-
Sinaia
-
Zitta, T., Neruda, M., Vojtech, L., The security of RFID readers with IDS/IPS solution using Raspberry Pi. 2017 18th International Carpathian Control Conference (ICCC), 2017, 316–320 Sinaia.
-
(2017)
2017 18th International Carpathian Control Conference (ICCC)
, pp. 316-320
-
-
Zitta, T.1
Neruda, M.2
Vojtech, L.3
-
20
-
-
85015419371
-
How to detect cyber-attacks in unmanned aerial vehicles network?
-
Washington, DC
-
Sedjelmaci, H., Senouci, S.M., Messous, M.A., How to detect cyber-attacks in unmanned aerial vehicles network?. 2016 IEEE Global Communications Conference (GLOBECOM), 2016, 1–6 Washington, DC.
-
(2016)
2016 IEEE Global Communications Conference (GLOBECOM)
, pp. 1-6
-
-
Sedjelmaci, H.1
Senouci, S.M.2
Messous, M.A.3
-
21
-
-
85027014073
-
DoS attacks prevention using IDS and data mining
-
Guwahati
-
Keshri, A., Singh, S., Agarwal, M., Nandiy, S.K., DoS attacks prevention using IDS and data mining. 2016 International Conference on Accessibility to Digital World (ICADW), 2016, 87–92 Guwahati.
-
(2016)
2016 International Conference on Accessibility to Digital World (ICADW)
, pp. 87-92
-
-
Keshri, A.1
Singh, S.2
Agarwal, M.3
Nandiy, S.K.4
-
22
-
-
85018344606
-
An evaluation framework for intrusion detection dataset
-
Pattaya
-
Gharib, A., Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A., An evaluation framework for intrusion detection dataset. 2016 International Conference on Information Science and Security (ICISS), 2016, 1–6 Pattaya.
-
(2016)
2016 International Conference on Information Science and Security (ICISS)
, pp. 1-6
-
-
Gharib, A.1
Sharafaldin, I.2
Lashkari, A.H.3
Ghorbani, A.A.4
-
23
-
-
85051044748
-
Design and implementation of an intrusion prevention system
-
Farhaoui, Yousef, Design and implementation of an intrusion prevention system. Int. J. Netw. Secur. 19:No.5 (2017), 675–683.
-
(2017)
Int. J. Netw. Secur.
, vol.19
, Issue.No.5
, pp. 675-683
-
-
Farhaoui, Y.1
-
24
-
-
85021938193
-
WedgeTail: an intrusion prevention system for the data plane of software defined networks
-
ACM New York, NY, USA
-
Shaghaghi, Arash, Ali Kaafar, Mohamed, Jha, Sanjay, WedgeTail: an intrusion prevention system for the data plane of software defined networks. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17), 2017, ACM, New York, NY, USA, 849–861.
-
(2017)
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17)
, pp. 849-861
-
-
Shaghaghi, A.1
Ali Kaafar, M.2
Jha, S.3
-
25
-
-
85001130767
-
-
Jozef Filipek and Ladislav Hudec, “Advances in distributed security for mobile ad hoc networks,” In Proceedings of the 17th International Conference on Computer Systems and Technologies 2016 (CompSysTech '16), Boris Rachev and Angel Smrikarov (Eds.). ACM, New York, NY, USA
-
Jozef Filipek and Ladislav Hudec, “Advances in distributed security for mobile ad hoc networks,” In Proceedings of the 17th International Conference on Computer Systems and Technologies 2016 (CompSysTech '16), Boris Rachev and Angel Smrikarov (Eds.). ACM, New York, NY, USA, 89–96.
-
-
-
-
27
-
-
84962038954
-
Towards achieving data security with the cloud computing adoption framework
-
Chang, V., Ramachandran, M., Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9:1 (Jan.-Feb. 1 2016), 138–151.
-
(2016)
IEEE Trans. Serv. Comput.
, vol.9
, Issue.1
, pp. 138-151
-
-
Chang, V.1
Ramachandran, M.2
-
28
-
-
84979928325
-
Intent-based extensible real-time PHP supervision framework
-
Prokhorenko, V., Choo, K.K.R., Ashman, H., Intent-based extensible real-time PHP supervision framework. IEEE Trans. Inf. Forensics Secur. 11:10 (Oct. 2016), 2215–2226.
-
(2016)
IEEE Trans. Inf. Forensics Secur.
, vol.11
, Issue.10
, pp. 2215-2226
-
-
Prokhorenko, V.1
Choo, K.K.R.2
Ashman, H.3
-
29
-
-
84988517354
-
ASIC design and implementation for VoIP intrusion prevention system
-
Okinawa
-
Chen, M.J., Wen, C.C., Lin, H.C., Chu, Y.S., ASIC design and implementation for VoIP intrusion prevention system. 2016 International Conference on Applied System Innovation (ICASI), 2016, 1–4 Okinawa.
-
(2016)
2016 International Conference on Applied System Innovation (ICASI)
, pp. 1-4
-
-
Chen, M.J.1
Wen, C.C.2
Lin, H.C.3
Chu, Y.S.4
-
30
-
-
85006365384
-
Quality evidence, quality decisions: ways to improve security and privacy of EHR systems
-
Munich
-
Osop, H., Sahama, T., Quality evidence, quality decisions: ways to improve security and privacy of EHR systems. 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 2016, 1–6 Munich.
-
(2016)
2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
, pp. 1-6
-
-
Osop, H.1
Sahama, T.2
-
31
-
-
85010390659
-
Analysis of attack and protection systems in Wi-Fi wireless networks under the Linux operating system
-
Curico
-
Yacchirena, A., Alulema, D., Aguilar, D., Morocho, D., Encalada, F., Granizo, E., Analysis of attack and protection systems in Wi-Fi wireless networks under the Linux operating system. 2016 IEEE International Conference on Automatica (ICA-ACCA), 2016, 1–7 Curico.
-
(2016)
2016 IEEE International Conference on Automatica (ICA-ACCA)
, pp. 1-7
-
-
Yacchirena, A.1
Alulema, D.2
Aguilar, D.3
Morocho, D.4
Encalada, F.5
Granizo, E.6
-
32
-
-
85013745649
-
Cloud security and privacy model for providing secure cloud services
-
Marrakech
-
El Makkaoui, K., Ezzati, A., Beni-Hssane, A., Motamed, C., Cloud security and privacy model for providing secure cloud services. 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), 2016, 81–86 Marrakech.
-
(2016)
2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)
, pp. 81-86
-
-
El Makkaoui, K.1
Ezzati, A.2
Beni-Hssane, A.3
Motamed, C.4
-
33
-
-
85018495153
-
Detection as a service: an SDN application
-
Bongpyeong
-
Monshizadeh, M., Khatri, V., Kantola, R., Detection as a service: an SDN application. 2017 19th International Conference on Advanced Communication Technology (ICACT), 2017, 285–290 Bongpyeong.
-
(2017)
2017 19th International Conference on Advanced Communication Technology (ICACT)
, pp. 285-290
-
-
Monshizadeh, M.1
Khatri, V.2
Kantola, R.3
-
34
-
-
84956680241
-
Distributed denial of service (DDos) resilience in cloud: review and conceptual cloud DDoS mitigation framework
-
Osanaiye, O., Choo, K.-K.R., Dlodlo, M., Distributed denial of service (DDos) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67 (2016), 147–165.
-
(2016)
J. Netw. Comput. Appl.
, vol.67
, pp. 147-165
-
-
Osanaiye, O.1
Choo, K.-K.R.2
Dlodlo, M.3
-
35
-
-
85010445048
-
Performance evaluation of fuzzy integrated firewall model for hybrid cloud based on packet utilization
-
Wuhan
-
Swapna, A.I., Rahman, Z., Rahman, M.H., Akramuzzaman, M., Performance evaluation of fuzzy integrated firewall model for hybrid cloud based on packet utilization. 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI), 2016, 253–256 Wuhan.
-
(2016)
2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI)
, pp. 253-256
-
-
Swapna, A.I.1
Rahman, Z.2
Rahman, M.H.3
Akramuzzaman, M.4
-
36
-
-
84991783825
-
Enhancement of VPN authentication using GPS information with geo-privacy protection
-
Waikoloa, HI
-
Jin, Y., Tomoishi, M., Matsuura, S., Enhancement of VPN authentication using GPS information with geo-privacy protection. 2016 25th International Conference on Computer Communication and Networks (ICCCN), 2016, 1–6 Waikoloa, HI.
-
(2016)
2016 25th International Conference on Computer Communication and Networks (ICCCN)
, pp. 1-6
-
-
Jin, Y.1
Tomoishi, M.2
Matsuura, S.3
-
37
-
-
84985906165
-
ANSwer: combining NFV and SDN features for network resilience strategies
-
Messina
-
Machado, C.C., Granville, L.Z., Schaeffer-Filho, A., ANSwer: combining NFV and SDN features for network resilience strategies. 2016 IEEE Symposium on Computers and Communication (ISCC), 2016, 391–396 Messina.
-
(2016)
2016 IEEE Symposium on Computers and Communication (ISCC)
, pp. 391-396
-
-
Machado, C.C.1
Granville, L.Z.2
Schaeffer-Filho, A.3
-
38
-
-
85011284137
-
A framework for security enhancement in SDN-based datacenters
-
Larnaca
-
Ammar, M., Rizk, M., Abdel-Hamid, A., Aboul-Seoud, A.K., A framework for security enhancement in SDN-based datacenters. 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2016, 1–4 Larnaca.
-
(2016)
2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
, pp. 1-4
-
-
Ammar, M.1
Rizk, M.2
Abdel-Hamid, A.3
Aboul-Seoud, A.K.4
-
39
-
-
85020197008
-
OpenAppID - application identification framework next generation of firewalls
-
Coimbatore
-
Patel, N.V., Patel, N.M., Kleopa, C., OpenAppID - application identification framework next generation of firewalls. 2016 Online International Conference on Green Engineering and Technologies (IC-GET), 2016, 1–5 Coimbatore.
-
(2016)
2016 Online International Conference on Green Engineering and Technologies (IC-GET)
, pp. 1-5
-
-
Patel, N.V.1
Patel, N.M.2
Kleopa, C.3
-
40
-
-
84964399843
-
Proofpoint uncovers internet of things (IoT) cyberattack
-
(last accessed October 31, 2017)
-
Proofpoint, Proofpoint uncovers internet of things (IoT) cyberattack. Proofpoint Release, 2014 http://investors.proofpoint.com/releasedetail.cfm?releaseid=819799 (last accessed October 31, 2017).
-
(2014)
Proofpoint Release
-
-
Proofpoint1
-
41
-
-
85011673180
-
Intrusion prevention system of automotive network CAN bus
-
Orlando, FL
-
Abbott-McCune, S., Shay, L.A., Intrusion prevention system of automotive network CAN bus. 2016 IEEE International Carnahan Conference on Security Technology (ICCST), 2016, 1–8 Orlando, FL.
-
(2016)
2016 IEEE International Carnahan Conference on Security Technology (ICCST)
, pp. 1-8
-
-
Abbott-McCune, S.1
Shay, L.A.2
-
43
-
-
85017036836
-
An FPGA architecture for ASIC-FPGA Co-design to streamline processing of IDSs
-
Orlando, FL
-
Sato, T., Chivapreecha, S., Moungnoul, P., Higuchi, K., An FPGA architecture for ASIC-FPGA Co-design to streamline processing of IDSs. 2016 International Conference on Collaboration Technologies and Systems (CTS), 2016, 412–417 Orlando, FL.
-
(2016)
2016 International Conference on Collaboration Technologies and Systems (CTS)
, pp. 412-417
-
-
Sato, T.1
Chivapreecha, S.2
Moungnoul, P.3
Higuchi, K.4
-
44
-
-
85015675970
-
Artifical immune system using Genetic Algorithm and decision tree
-
Dubai
-
Al-Douri, Y.K., Pangracious, V., Al-Doori, M., Artifical immune system using Genetic Algorithm and decision tree. 2016 International Conference on Bio-engineering for Smart Technologies (BioSMART), 2016, 1–4 Dubai.
-
(2016)
2016 International Conference on Bio-engineering for Smart Technologies (BioSMART)
, pp. 1-4
-
-
Al-Douri, Y.K.1
Pangracious, V.2
Al-Doori, M.3
-
45
-
-
85016044085
-
A performance study of anomaly detection using entropy method
-
Tangerang
-
Waskita, A.A., Suhartanto, H., Handoko, L.T., A performance study of anomaly detection using entropy method. 2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA), 2016, 137–140 Tangerang.
-
(2016)
2016 International Conference on Computer, Control, Informatics and its Applications (IC3INA)
, pp. 137-140
-
-
Waskita, A.A.1
Suhartanto, H.2
Handoko, L.T.3
-
46
-
-
85015213755
-
Attack detection of distributed denial of service based on Splunk
-
Tainan
-
Su, T.J., Wang, S.M., Chen, Y.F., Liu, C.L., Attack detection of distributed denial of service based on Splunk. 2016 International Conference on Advanced Materials for Science and Engineering (ICAMSE), 2016, 397–400 Tainan.
-
(2016)
2016 International Conference on Advanced Materials for Science and Engineering (ICAMSE)
, pp. 397-400
-
-
Su, T.J.1
Wang, S.M.2
Chen, Y.F.3
Liu, C.L.4
-
47
-
-
84991071149
-
Performance study of 802.11w for preventing DoS attacks on wireless local area networks
-
Liu, Chibiao, Qiu, Jinming, Performance study of 802.11w for preventing DoS attacks on wireless local area networks. Wirel. Personal. Commun. 95:2 (2017), 1031–1053.
-
(2017)
Wirel. Personal. Commun.
, vol.95
, Issue.2
, pp. 1031-1053
-
-
Liu, C.1
Qiu, J.2
-
48
-
-
85008703761
-
The performance analysis of honeypot based intrusion detection system for wireless network
-
Neha, Agrawal, Tapaswi, Shashikala, The performance analysis of honeypot based intrusion detection system for wireless network. Int. J. Wirel. Inf. Netw. 24:1 (2017), 14–26.
-
(2017)
Int. J. Wirel. Inf. Netw.
, vol.24
, Issue.1
, pp. 14-26
-
-
Neha, A.1
Tapaswi, S.2
-
49
-
-
85017615349
-
Optimal response to computer network threats
-
Tehran
-
Abazari, F., Madani, A., Gharaee, H., Optimal response to computer network threats. 2016 8th International Symposium on Telecommunications (IST), 2016, 729–734 Tehran.
-
(2016)
2016 8th International Symposium on Telecommunications (IST)
, pp. 729-734
-
-
Abazari, F.1
Madani, A.2
Gharaee, H.3
-
50
-
-
84957973763
-
Performance comparison and detection analysis in Snort and Suricata environment
-
Park, Wonhyung, Seongjin, Ahn, Performance comparison and detection analysis in Snort and Suricata environment. Wirel. Personal. Commun. 94:2 (2017), 241–252.
-
(2017)
Wirel. Personal. Commun.
, vol.94
, Issue.2
, pp. 241-252
-
-
Park, W.1
Seongjin, A.2
-
51
-
-
85051021416
-
-
Y. Qian; J. Chen; K. Hwang; S. Mao; L. Hu, “Privacy protection and intrusion avoidance for cloudlet-based medical data sharing,” in IEEE Transactions on Cloud Computing, vol.PP, no.vol. 99, pp.1–1.
-
M. Chen; Y. Qian; J. Chen; K. Hwang; S. Mao; L. Hu, “Privacy protection and intrusion avoidance for cloudlet-based medical data sharing,” in IEEE Transactions on Cloud Computing, vol.PP, no.vol. 99, pp.1–1.
-
-
-
Chen1
, M.2
-
52
-
-
85015419371
-
How to detect cyber-attacks in unmanned aerial vehicles network?
-
Washington, DC
-
Sedjelmaci, H., Senouci, S.M., Messous, M.A., How to detect cyber-attacks in unmanned aerial vehicles network?. 2016 IEEE Global Communications Conference (GLOBECOM), 2016, 1–6 Washington, DC.
-
(2016)
2016 IEEE Global Communications Conference (GLOBECOM)
, pp. 1-6
-
-
Sedjelmaci, H.1
Senouci, S.M.2
Messous, M.A.3
-
53
-
-
84922789148
-
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms
-
Kuala Lumpur
-
Mirza, N.A.S., Abbas, H., Khan, F.A., Al Muhtadi, J., Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms. 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 2014, 129–132 Kuala Lumpur.
-
(2014)
2014 International Symposium on Biometrics and Security Technologies (ISBAST)
, pp. 129-132
-
-
Mirza, N.A.S.1
Abbas, H.2
Khan, F.A.3
Al Muhtadi, J.4
-
54
-
-
84900614780
-
Collaborative network security in multi-tenant data center for cloud computing
-
Chen, Z., Dong, W., Li, H., Zhang, P., Chen, X., Cao, J., Collaborative network security in multi-tenant data center for cloud computing. Tsinghua Sci. Technol. 19:1 (Feb. 2014), 82–94.
-
(2014)
Tsinghua Sci. Technol.
, vol.19
, Issue.1
, pp. 82-94
-
-
Chen, Z.1
Dong, W.2
Li, H.3
Zhang, P.4
Chen, X.5
Cao, J.6
-
55
-
-
84906738301
-
"Advanced security management system for critical infrastructures
-
Chania
-
Karantjias, A., Polemi, N., Papastergiou, S., “Advanced security management system for critical infrastructures. IISA 2014, the 5th International Conference on Information, Intelligence, Systems and Applications, 2014, 291–297 Chania.
-
(2014)
IISA 2014, the 5th International Conference on Information, Intelligence, Systems and Applications
, pp. 291-297
-
-
Karantjias, A.1
Polemi, N.2
Papastergiou, S.3
-
56
-
-
84902251107
-
GAMMA - filling the security management void of SESAR and NextGen
-
H3-H1-H3-9, Herndon, VA
-
Koelle, R., Markarian, G., Kolev, D., GAMMA - filling the security management void of SESAR and NextGen. 2014 Integrated Communications, Navigation and Surveillance Conference (ICNS) Conference Proceedings, 2014 H3-H1-H3-9, Herndon, VA.
-
(2014)
2014 Integrated Communications, Navigation and Surveillance Conference (ICNS) Conference Proceedings
-
-
Koelle, R.1
Markarian, G.2
Kolev, D.3
-
58
-
-
84962293469
-
A crowdsourcing approach to protect against novel malware threats
-
Belgrade
-
Christoforidis, C., Vlachos, V., Androulidakis, I., A crowdsourcing approach to protect against novel malware threats. 2014 22nd Telecommunications Forum Telfor (TELFOR), 2014, 1063–1066 Belgrade.
-
(2014)
2014 22nd Telecommunications Forum Telfor (TELFOR)
, pp. 1063-1066
-
-
Christoforidis, C.1
Vlachos, V.2
Androulidakis, I.3
-
60
-
-
84903746520
-
Requirements-driven mediation for collaborative security
-
ACM New York, NY, USA
-
Bennaceur, Amel, Bandara, Arosha K., Jackson, Michael, Liu, Wei, Montrieux, Lionel, Than Tun, Thein, Yu, Yijun, Nuseibeh, Bashar, Requirements-driven mediation for collaborative security. Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-managing Systems (SEAMS 2014), 2014, ACM, New York, NY, USA, 37–42.
-
(2014)
Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-managing Systems (SEAMS 2014)
, pp. 37-42
-
-
Bennaceur, A.1
Bandara, A.K.2
Jackson, M.3
Liu, W.4
Montrieux, L.5
Than Tun, T.6
Yu, Y.7
Nuseibeh, B.8
-
61
-
-
84937682860
-
ACH walkthrough: a distributed multi-device tool for collaborative security analysis
-
ACM New York, NY, USA
-
Wilson, Jeff, Brown, Judith M., Biddle, Robert, ACH walkthrough: a distributed multi-device tool for collaborative security analysis. Proceedings of the 2014 ACM Workshop on Security Information Workers (SIW '14), 2014, ACM, New York, NY, USA, 9–16.
-
(2014)
Proceedings of the 2014 ACM Workshop on Security Information Workers (SIW '14)
, pp. 9-16
-
-
Wilson, J.1
Brown, J.M.2
Biddle, R.3
-
62
-
-
84906508304
-
LESS is more: host-agent based simulator for large-scale evaluation of security systems
-
Sonchack, John, Aviv, Adam J., LESS is more: host-agent based simulator for large-scale evaluation of security systems. European Symposium on Research in Computer Security,Computer Security – ESORICS, 2014, 365–382.
-
(2014)
European Symposium on Research in Computer Security,Computer Security – ESORICS
, pp. 365-382
-
-
Sonchack, J.1
Aviv, A.J.2
-
63
-
-
84937678696
-
PrefiSec: a distributed alliance framework for collaborative BGP monitoring and prefix-based security
-
ACM New York, NY, USA
-
Hiran, Rahul, Carlsson, Niklas, Shahmehri, Nahid, PrefiSec: a distributed alliance framework for collaborative BGP monitoring and prefix-based security. Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (WISCS '14), 2014, ACM, New York, NY, USA, 3–12.
-
(2014)
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (WISCS '14)
, pp. 3-12
-
-
Hiran, R.1
Carlsson, N.2
Shahmehri, N.3
-
64
-
-
84937694115
-
Privacy preserving data quality assessment for high-fidelity data sharing
-
ACM New York, NY, USA
-
Freudiger, Julien, Rane, Shantanu, Brito, Alejandro E., Uzun, Ersin, Privacy preserving data quality assessment for high-fidelity data sharing. Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (WISCS '14), 2014, ACM, New York, NY, USA, 21–29.
-
(2014)
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (WISCS '14)
, pp. 21-29
-
-
Freudiger, J.1
Rane, S.2
Brito, A.E.3
Uzun, E.4
-
65
-
-
84906813967
-
A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications
-
Ben Saied, Yosra, Olivereau, Alexis, Zeghlache, Djamal, Laurent, Maryline, A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. J. Netw. Comput. Appl. 45 (2014), 215–227 ISSN 1084-8045.
-
(2014)
J. Netw. Comput. Appl.
, vol.45
, pp. 215-227
-
-
Ben Saied, Y.1
Olivereau, A.2
Zeghlache, D.3
Laurent, M.4
-
66
-
-
84942105224
-
Game-theoretic strategies for IDS deployment in peer-to-peer networks
-
Narang, Pratik, Hota, Chittaranjan, Game-theoretic strategies for IDS deployment in peer-to-peer networks. Inf. Syst. Front. 17 5:October 2015 (2015), 1017–1028.
-
(2015)
Inf. Syst. Front. 17
, vol.5
, Issue.October 2015
, pp. 1017-1028
-
-
Narang, P.1
Hota, C.2
-
67
-
-
85008640878
-
Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system
-
Li, Beibei, Lu, Rongxing, Wang, Wei, Choo, Kim-Kwang Raymond, Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. J. Parallel Distrib. Comput. 103, C:May 2017 (2017), 32–41.
-
(2017)
J. Parallel Distrib. Comput.
, vol.103 C
, Issue.May 2017
, pp. 32-41
-
-
Li, B.1
Lu, R.2
Wang, W.3
Choo, K.-K.R.4
-
68
-
-
84956853933
-
A general collaborative framework for modeling and perceiving distributed network behavior
-
Xie, Y., Wang, Y., He, H., Xiang, Y., Yu, S., Liu, X., A general collaborative framework for modeling and perceiving distributed network behavior. IEEE/ACM Trans. Netw. 24:5 (October 2016), 3162–3176.
-
(2016)
IEEE/ACM Trans. Netw.
, vol.24
, Issue.5
, pp. 3162-3176
-
-
Xie, Y.1
Wang, Y.2
He, H.3
Xiang, Y.4
Yu, S.5
Liu, X.6
-
70
-
-
84994157603
-
Configuration strategies for collaborative IDS using game theory
-
Shiraz
-
Ghorbani, M., Ghorbani, H.R., Hashemi, M.R., Configuration strategies for collaborative IDS using game theory. 2016 24th Iranian Conference on Electrical Engineering (ICEE), 2016, 261–266 Shiraz.
-
(2016)
2016 24th Iranian Conference on Electrical Engineering (ICEE)
, pp. 261-266
-
-
Ghorbani, M.1
Ghorbani, H.R.2
Hashemi, M.R.3
-
71
-
-
85051029879
-
-
K. Ota; M. Dong; J. Li; H. Wang, “Big data analysis based security situational awareness for smart grid,” in IEEE Trans. Big Data, vol.PP, no.99, pp.1–1.
-
J. Wu; K. Ota; M. Dong; J. Li; H. Wang, “Big data analysis based security situational awareness for smart grid,” in IEEE Trans. Big Data, vol.PP, no.99, pp.1–1.
-
-
-
Wu1
, J.2
-
72
-
-
85009819004
-
Mobile health (m-Health) system in the context of IoT
-
Vienna
-
Almotiri, S.H., Khan, M.A., Alghamdi, M.A., Mobile health (m-Health) system in the context of IoT. 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 2016, 39–42 Vienna.
-
(2016)
2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
, pp. 39-42
-
-
Almotiri, S.H.1
Khan, M.A.2
Alghamdi, M.A.3
-
73
-
-
85011891525
-
I know what you did before”: general framework for correlation analysis of cyber threat incidents
-
Baltimore, MD
-
Kim, Daegeon, Woo, JiYoung, Kim, Huy Kang, I know what you did before”: general framework for correlation analysis of cyber threat incidents. MILCOM 2016-2016 IEEE Military Communications Conference, 2016, 782–787 Baltimore, MD.
-
(2016)
MILCOM 2016-2016 IEEE Military Communications Conference
, pp. 782-787
-
-
Kim, D.1
Woo, J.2
Kim, H.K.3
-
74
-
-
84964282510
-
Network malware classification comparison using DPI and flow packet headers
-
Boukhtouta, Amine, Mokhov, Serguei A., Lakhdari, Nour-Eddine, Debbabi, Mourad, Paquet, Joey, Network malware classification comparison using DPI and flow packet headers. J. Comput. Virology Hacking Tech. 12:2 (2016), 69–100.
-
(2016)
J. Comput. Virology Hacking Tech.
, vol.12
, Issue.2
, pp. 69-100
-
-
Boukhtouta, A.1
Mokhov, S.A.2
Lakhdari, N.-E.3
Debbabi, M.4
Paquet, J.5
-
76
-
-
84966671352
-
HogMap: using SDNs to incentivize collaborative security monitoring
-
ACM New York, NY, USA
-
Pan, Xiang, Yegneswaran, Vinod, Chen, Yan, Porras, Phillip, Shin, Seungwon, HogMap: using SDNs to incentivize collaborative security monitoring. Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security '16), 2016, ACM, New York, NY, USA, 7–12.
-
(2016)
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security '16)
, pp. 7-12
-
-
Pan, X.1
Yegneswaran, V.2
Chen, Y.3
Porras, P.4
Shin, S.5
-
77
-
-
84999018255
-
Collaborative incident handling based on the blackboard-pattern
-
ACM New York, NY, USA
-
Herold, Nadine, Kinkelin, Holger, Carle, Georg, Collaborative incident handling based on the blackboard-pattern. Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security (WISCS '16), 2016, ACM, New York, NY, USA, 25–34.
-
(2016)
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security (WISCS '16)
, pp. 25-34
-
-
Herold, N.1
Kinkelin, H.2
Carle, G.3
-
79
-
-
85051010250
-
-
da Costa Júnior, Edmilson P., et al. “An Architecture for Self-adaptive Distributed Firewall.”.
-
da Costa Júnior, Edmilson P., et al. “An Architecture for Self-adaptive Distributed Firewall.”.
-
-
-
-
80
-
-
85010073626
-
Security situation management - developing a concept of operations and threat prediction capability
-
4C2-1-4C2-11, Prague
-
Kolev, D., Koelle, R., Ana Casar Rodriguez, Rosa, Montefusco, P., Security situation management - developing a concept of operations and threat prediction capability. 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), 2015 4C2-1-4C2-11, Prague.
-
(2015)
2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC)
-
-
Kolev, D.1
Koelle, R.2
Ana Casar Rodriguez, R.3
Montefusco, P.4
-
81
-
-
84966930566
-
Enhancing access-control with risk-metrics for collaboration on social cloud-platforms
-
Helsinki
-
Bouchami, A., Goettelmann, E., Perrin, O., Godart, C., Enhancing access-control with risk-metrics for collaboration on social cloud-platforms. 2015 IEEE Trustcom/BigDataSE/ISPA, 2015, 864–871 Helsinki.
-
(2015)
2015 IEEE Trustcom/BigDataSE/ISPA
, pp. 864-871
-
-
Bouchami, A.1
Goettelmann, E.2
Perrin, O.3
Godart, C.4
-
83
-
-
84962892965
-
Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm
-
Indore
-
Arya, N., Singh, U., Singh, S., Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm. 2015 International Conference on Computer, Communication and Control (IC4), 2015, 1–5 Indore.
-
(2015)
2015 International Conference on Computer, Communication and Control (IC4)
, pp. 1-5
-
-
Arya, N.1
Singh, U.2
Singh, S.3
-
84
-
-
84962907279
-
Secure data transmission on MANET by hybrid cryptography technique
-
Indore
-
Sharma, A., Bhuriya, D., Singh, U., Secure data transmission on MANET by hybrid cryptography technique. 2015 International Conference on Computer, Communication and Control (IC4), 2015, 1–6 Indore.
-
(2015)
2015 International Conference on Computer, Communication and Control (IC4)
, pp. 1-6
-
-
Sharma, A.1
Bhuriya, D.2
Singh, U.3
-
85
-
-
84969924884
-
SkipMon: a locality-aware collaborative intrusion detection system
-
Nanjing
-
Vasilomanolakis, E., Krügl, M., Cordero, C.G., Mühlhäuser, M., Fischer, M., SkipMon: a locality-aware collaborative intrusion detection system. 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), 2015, 1–8 Nanjing.
-
(2015)
2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)
, pp. 1-8
-
-
Vasilomanolakis, E.1
Krügl, M.2
Cordero, C.G.3
Mühlhäuser, M.4
Fischer, M.5
-
86
-
-
84964902407
-
Community-based secure information and resource sharing in AWS public cloud
-
Hangzhou
-
Zhang, Y., Patwa, F., Sandhu, R., Community-based secure information and resource sharing in AWS public cloud. 2015 IEEE Conference on Collaboration and Internet Computing (CIC), 2015, 46–53 Hangzhou.
-
(2015)
2015 IEEE Conference on Collaboration and Internet Computing (CIC)
, pp. 46-53
-
-
Zhang, Y.1
Patwa, F.2
Sandhu, R.3
-
87
-
-
84979658402
-
Collaborative intrusion detection as a service in cloud computing environment
-
Nanjing
-
Liang, Hong, Ge, Yufei, Wang, Wenjiao, Chen, Lin, Collaborative intrusion detection as a service in cloud computing environment. 2015 IEEE International Conference on Progress in Informatics and Computing (PIC), 2015, 476–480 Nanjing.
-
(2015)
2015 IEEE International Conference on Progress in Informatics and Computing (PIC)
, pp. 476-480
-
-
Liang, H.1
Ge, Y.2
Wang, W.3
Chen, L.4
-
88
-
-
84991108595
-
Detecting intrusions in federated cloud environments using security as a service
-
Duai
-
Mac Dermott, Á., Shi, Q., Kifayat, K., Detecting intrusions in federated cloud environments using security as a service. 2015 International Conference on Developments of E-systems Engineering (DeSE), 2015, 91–96 Duai.
-
(2015)
2015 International Conference on Developments of E-systems Engineering (DeSE)
, pp. 91-96
-
-
Mac Dermott, Á.1
Shi, Q.2
Kifayat, K.3
-
89
-
-
84944049641
-
CYSM: an innovative physical/cyber security management system for ports
-
Papastergiou, Spyridon, Polemi, Nineta, Karantjias, Athanasios, CYSM: an innovative physical/cyber security management system for ports. International Conference on Human Aspects of Information Security, Privacy, and Trust, 2015, 219–230.
-
(2015)
International Conference on Human Aspects of Information Security, Privacy, and Trust
, pp. 219-230
-
-
Papastergiou, S.1
Polemi, N.2
Karantjias, A.3
-
90
-
-
84956988204
-
Controlled data sharing for collaborative predictive blacklisting
-
Springer Cham
-
Freudiger, Julien, De Cristofaro, Emiliano, Brito, Alejandro E., Controlled data sharing for collaborative predictive blacklisting. International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2015, Springer, Cham.
-
(2015)
International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
-
-
Freudiger, J.1
De Cristofaro, E.2
Brito, A.E.3
-
91
-
-
84952061865
-
Fine-grained risk level quantication schemes based on APK metadata
-
Takahashi, Takeshi, Ban, Tao, Mimura, Takao, Nakao, Koji, Fine-grained risk level quantication schemes based on APK metadata. International Conference on Neural Information Processing, 2015, 663–673.
-
(2015)
International Conference on Neural Information Processing
, pp. 663-673
-
-
Takahashi, T.1
Ban, T.2
Mimura, T.3
Nakao, K.4
-
92
-
-
84958092594
-
Community-based collaborative intrusion detection
-
Cordero, C.G., Vasilomanolakis, E., Mühlhäuser, M., Fischer, M., Community-based collaborative intrusion detection. SecureComm, 2015 Oct 26, 665–681.
-
(2015)
SecureComm
, pp. 665-681
-
-
Cordero, C.G.1
Vasilomanolakis, E.2
Mühlhäuser, M.3
Fischer, M.4
-
93
-
-
85019606698
-
Accounting for the human user in predictive security models
-
Christchurch, New Zealand
-
Noureddine, M.A., Marturano, A., Keefe, K., Bashir, M., Sanders, W.H., Accounting for the human user in predictive security models. 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), 2017, 329–338 Christchurch, New Zealand.
-
(2017)
2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC)
, pp. 329-338
-
-
Noureddine, M.A.1
Marturano, A.2
Keefe, K.3
Bashir, M.4
Sanders, W.H.5
-
94
-
-
84944319215
-
Stochastic activity networks: formal definitions and concepts
-
E. Brinksma H. Hermanns J.-P. Katoen Springer Berlin Heidelberg
-
Sanders, W.H., Meyer, J.F., Stochastic activity networks: formal definitions and concepts. Brinksma, E., Hermanns, H., Katoen, J.-P., (eds.) Lectures on Formal Methods and Performance Analysis, Ser. Lecture Notes in Computer Science, vol. 2090, 2001, Springer Berlin Heidelberg, 315–343.
-
(2001)
Lectures on Formal Methods and Performance Analysis, Ser. Lecture Notes in Computer Science
, vol.2090
, pp. 315-343
-
-
Sanders, W.H.1
Meyer, J.F.2
-
95
-
-
84967333002
-
A novel architecture for predictive CyberSecurity using non-homogenous Markov models
-
Helsinki
-
Abraham, S., Nair, S., A novel architecture for predictive CyberSecurity using non-homogenous Markov models. 2015 IEEE Trustcom/BigDataSE/ISPA, 2015, 774–781 Helsinki.
-
(2015)
2015 IEEE Trustcom/BigDataSE/ISPA
, pp. 774-781
-
-
Abraham, S.1
Nair, S.2
-
96
-
-
84966908924
-
An analysis of CVSS v2 environmental scoring
-
Date: 9–11
-
Oluwaseun, A., Pavol, Z., Dale, L., Ron, R., An analysis of CVSS v2 environmental scoring. Privacy, Security, Risk and Trust (PASSAT), Oct. 2011 Date: 9–11.
-
(2011)
Privacy, Security, Risk and Trust (PASSAT)
-
-
Oluwaseun, A.1
Pavol, Z.2
Dale, L.3
Ron, R.4
-
97
-
-
85051040649
-
-
“Common vulnerability scoring system (CVSS),”
-
M. Schiffman, “Common vulnerability scoring system (CVSS),” http://www.first.org/cvss/.
-
-
-
Schiffman, M.1
-
98
-
-
84920267716
-
A Software Application to Analyze Affects of Temporal and Environmental Metrics on Overall CVSS V2 Score
-
Concordia University College of Alberta Edmonton, Canada
-
Ali, Assad, Zavarsky, Pavol, Lindskog, Dale, Ruhl, Ron, A Software Application to Analyze Affects of Temporal and Environmental Metrics on Overall CVSS V2 Score. October 2010, Concordia University College of Alberta, Edmonton, Canada.
-
(2010)
-
-
Ali, A.1
Zavarsky, P.2
Lindskog, D.3
Ruhl, R.4
-
99
-
-
85051029039
-
-
https://nvd.nist.gov/[last accessed 11September 2017].
-
-
-
-
100
-
-
84939506714
-
Cloudlet mesh for securing mobile clouds from intrusions and network attacks
-
San Francisco, CA
-
Shi, Y., Abhilash, S., Hwang, K., Cloudlet mesh for securing mobile clouds from intrusions and network attacks. 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2015, 109–118 San Francisco, CA.
-
(2015)
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
, pp. 109-118
-
-
Shi, Y.1
Abhilash, S.2
Hwang, K.3
-
101
-
-
77956356055
-
Trusted cloud computing resources and data coloring
-
Hwang, K., Li, D., Trusted cloud computing resources and data coloring. IEEE Internet Co., 14, Sept. 2010.
-
(2010)
IEEE Internet Co.
, vol.14
-
-
Hwang, K.1
Li, D.2
-
102
-
-
85051037367
-
A novel adaptive grey verhulst model for network security situation prediction
-
Leau, Yu-Beng, Manickam, Selvakumar, A novel adaptive grey verhulst model for network security situation prediction. Int. J. Adv. Comput. Sci. Appl. 1:7 (2016), 90–95.
-
(2016)
Int. J. Adv. Comput. Sci. Appl.
, vol.1
, Issue.7
, pp. 90-95
-
-
Leau, Y.-B.1
Manickam, S.2
-
103
-
-
85051033898
-
-
The Coco Framework Technical Overview. [last accessed 10 October 2017].
-
Microsoft 2017. The Coco Framework Technical Overview. https://raw.githubusercontent.com/Azure/coco.framework/master/docs/Coco%20Framework%20whitepaper.pdf [last accessed 10 October 2017].
-
(2017)
-
-
Microsoft1
-
104
-
-
84979828304
-
Blockchains and smart contracts for the internet of things
-
Christidis, K., Devetsikiotis, M., Blockchains and smart contracts for the internet of things. IEEE Access 4 (2016), 2292–2303.
-
(2016)
IEEE Access
, vol.4
, pp. 2292-2303
-
-
Christidis, K.1
Devetsikiotis, M.2
|