-
1
المؤلفون: Yaoqing Liu, Hong Zhao, Anthony Dowling, Lauren M. Huie, Laurent Njilla
المصدر: Intelligent and Converged Networks. 2:1-15
مصطلحات موضوعية: Network architecture, computer.internet_protocol, Computer science, business.industry, Wireless ad hoc network, Interoperability, Network layer, Information-centric networking, RADIUS, Wireless, business, computer, Dissemination, Computer network
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::6c872e9ae203d86d4bb33975268bb816Test
https://doi.org/10.23919/icn.2021.0001Test -
2
المؤلفون: Yifan Tian, Jiawei Yuan, Laurent Njilla, Shucheng Yu
المصدر: IEEE Internet of Things Journal. 8:3300-3309
مصطلحات موضوعية: Smart system, Cryptographic primitive, Computer Networks and Communications, Computer science, business.industry, Distributed computing, Inference, 020206 networking & telecommunications, Cryptography, Cloud computing, 02 engineering and technology, 010501 environmental sciences, Encryption, 01 natural sciences, Computer Science Applications, Information sensitivity, Hardware and Architecture, Server, Signal Processing, 0202 electrical engineering, electronic engineering, information engineering, business, Edge computing, 0105 earth and related environmental sciences, Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::86638be3949a40e5a5cfc7c29a3f8e7eTest
https://doi.org/10.1109/jiot.2020.3003468Test -
3
المصدر: IEEE Access, Vol 9, Pp 49662-49682 (2021)
مصطلحات موضوعية: Power graph analysis, General Computer Science, Computer science, media_common.quotation_subject, cyber decoy, 0211 other engineering and technologies, 02 engineering and technology, Intrusion detection system, cyber defense, Computer security, computer.software_genre, Phase (combat), lateral movement, 0202 electrical engineering, electronic engineering, information engineering, General Materials Science, Hidden Markov model, media_common, 021110 strategic, defence & security studies, General Engineering, Deception, Software deployment, Path (graph theory), intrusion detection system, 020201 artificial intelligence & image processing, lcsh:Electrical engineering. Electronics. Nuclear engineering, Cyber deception, Decoy, computer, lcsh:TK1-9971, hidden Markov Model
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::167c8fad8a95f08eea217e644c35c99dTest
https://ieeexplore.ieee.org/document/9387290Test/ -
4
المصدر: IEEE Transactions on Dependable and Secure Computing. 17:1257-1268
مصطلحات موضوعية: 021110 strategic, defence & security studies, Computer science, business.industry, Stochastic game, 0211 other engineering and technologies, Evasion (network security), 02 engineering and technology, Computer security, computer.software_genre, Bayesian game, symbols.namesake, Nash equilibrium, Complete information, symbols, Web application, Malware, Electrical and Electronic Engineering, business, computer, Dissemination
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::8c428058b7d4e10c03fac1df00b84279Test
https://doi.org/10.1109/tdsc.2018.2866821Test -
5
المؤلفون: Laurent Njilla, Ning Zhang, Wei Yan, Xuan Zhang
المصدر: IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 28:2196-2209
مصطلحات موضوعية: Blockchain, Computer science, business.industry, Distributed computing, Hash function, Cryptography, 02 engineering and technology, Cryptographic protocol, 020202 computer hardware & architecture, Consensus, Hardware and Architecture, 0202 electrical engineering, electronic engineering, information engineering, Key (cryptography), Electrical and Electronic Engineering, business, Protocol (object-oriented programming), Software
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::fe0739b34dc0498b11a3cce07fb0b7c6Test
https://doi.org/10.1109/tvlsi.2020.3014155Test -
6
المؤلفون: Laurent Njilla, Zhongshu Gu, Kui Ren, DaeHun Nyang, Zhenhua Li, Aziz Mohaisen, Charles A. Kamhoua
المصدر: IEEE Transactions on Dependable and Secure Computing. 17:745-759
مصطلحات موضوعية: 021110 strategic, defence & security studies, business.industry, Computer science, Domain Name System, 0211 other engineering and technologies, Cryptography, 02 engineering and technology, Computer security, computer.software_genre, Complement (complexity), Domain (software engineering), Public-key cryptography, Data integrity, Server, The Internet, Electrical and Electronic Engineering, business, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::e94296a036c564dbcf3cc8717e0bcb9dTest
https://doi.org/10.1109/tdsc.2018.2816026Test -
7
المؤلفون: Laurent Njilla, Hong Zhao, Charles A. Kamhoua, Kevin Kwiat, Luke Kwiat
المصدر: IEEE Transactions on Dependable and Secure Computing. 17:716-729
مصطلحات موضوعية: 021110 strategic, defence & security studies, Computational complexity theory, business.industry, Computer science, Dynamic data, 0211 other engineering and technologies, 02 engineering and technology, Chip, CHAOS (operating system), Hardware Trojan, Trojan, Embedded system, Overhead (computing), Electrical and Electronic Engineering, business, Statistical hypothesis testing
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::6b828cbaa1e0df364eb172d26de94561Test
https://doi.org/10.1109/tdsc.2018.2864733Test -
8
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: Computer science, media_common.quotation_subject, Deception, Computer security, computer.software_genre, computer, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::8669fd9cda9cb6210e17d248cd01afbeTest
https://doi.org/10.1002/9781119593386.ch7Test -
9
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: Computer science, media_common.quotation_subject, Monte Carlo method, Observable, Statistical physics, Deception, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::313f7c4b9c3bc4c6e0a0ba6b5a7e3c4bTest
https://doi.org/10.1002/9781119593386.ch14Test -
10
المؤلفون: Aziz Mohaisen, Afsah Anwar, Laurent Njilla, Charles A. Kamhoua, Hisham Alasmary
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: World Wide Web, business.industry, Computer science, Cross layer, Profiling (information science), Internet of Things, business, Security layer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::07cf3a6f0b3123457bfc4ed70893deacTest
https://doi.org/10.1002/9781119593386.ch11Test