-
1
المصدر: IEEE Access, Vol 9, Pp 49662-49682 (2021)
مصطلحات موضوعية: Power graph analysis, General Computer Science, Computer science, media_common.quotation_subject, cyber decoy, 0211 other engineering and technologies, 02 engineering and technology, Intrusion detection system, cyber defense, Computer security, computer.software_genre, Phase (combat), lateral movement, 0202 electrical engineering, electronic engineering, information engineering, General Materials Science, Hidden Markov model, media_common, 021110 strategic, defence & security studies, General Engineering, Deception, Software deployment, Path (graph theory), intrusion detection system, 020201 artificial intelligence & image processing, lcsh:Electrical engineering. Electronics. Nuclear engineering, Cyber deception, Decoy, computer, lcsh:TK1-9971, hidden Markov Model
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::167c8fad8a95f08eea217e644c35c99dTest
https://ieeexplore.ieee.org/document/9387290Test/ -
2
المصدر: IEEE Transactions on Dependable and Secure Computing. 17:1257-1268
مصطلحات موضوعية: 021110 strategic, defence & security studies, Computer science, business.industry, Stochastic game, 0211 other engineering and technologies, Evasion (network security), 02 engineering and technology, Computer security, computer.software_genre, Bayesian game, symbols.namesake, Nash equilibrium, Complete information, symbols, Web application, Malware, Electrical and Electronic Engineering, business, computer, Dissemination
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::8c428058b7d4e10c03fac1df00b84279Test
https://doi.org/10.1109/tdsc.2018.2866821Test -
3
المؤلفون: Laurent Njilla, Zhongshu Gu, Kui Ren, DaeHun Nyang, Zhenhua Li, Aziz Mohaisen, Charles A. Kamhoua
المصدر: IEEE Transactions on Dependable and Secure Computing. 17:745-759
مصطلحات موضوعية: 021110 strategic, defence & security studies, business.industry, Computer science, Domain Name System, 0211 other engineering and technologies, Cryptography, 02 engineering and technology, Computer security, computer.software_genre, Complement (complexity), Domain (software engineering), Public-key cryptography, Data integrity, Server, The Internet, Electrical and Electronic Engineering, business, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::e94296a036c564dbcf3cc8717e0bcb9dTest
https://doi.org/10.1109/tdsc.2018.2816026Test -
4
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: Computer science, media_common.quotation_subject, Deception, Computer security, computer.software_genre, computer, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::8669fd9cda9cb6210e17d248cd01afbeTest
https://doi.org/10.1002/9781119593386.ch7Test -
5
المؤلفون: Laurent Njilla, Garegin Grigoryan, Charles A. Kamhoua, Yaoqing Liu
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: Leverage (finance), business.industry, Computer science, media_common.quotation_subject, Deception, Internet of Things, business, Computer security, computer.software_genre, Software-defined networking, computer, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::cb2b4a01e39b9696be0ae339c0eca8f2Test
https://doi.org/10.1002/9781119593386.ch21Test -
6
المؤلفون: Alexander Kott, Laurent Njilla, Sachin Shetty, Charles A. Kamhoua
المصدر: Blockchain for Distributed Systems Security
مصطلحات موضوعية: Government, System deployment, business.industry, Computer science, Survivability, Cloud computing, Computer security, computer.software_genre, Trustworthy computing, Scalability, business, Resource management (computing), Mobile device, computer, Edge computing
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b3588881fcc6f9cfba5d8a254192c1e4Test
https://doi.org/10.1002/9781119593386.ch26Test -
7
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: 021110 strategic, defence & security studies, Service (systems architecture), Computer science, business.industry, media_common.quotation_subject, 0211 other engineering and technologies, 020206 networking & telecommunications, Jamming, 02 engineering and technology, Computer security, computer.software_genre, Secrecy, 0202 electrical engineering, electronic engineering, information engineering, Trust management (information system), Quality (business), Spectrum sharing, Internet of Things, business, computer, media_common, Reputation
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::d3306d45977126373d88a7960bd1ca91Test
https://doi.org/10.1002/9781119593386.ch4Test -
8
المؤلفون: Laurent Njilla, Charles A. Kamhoua, Satyaki Nan, Swastik Brahma
المصدر: Modeling and Design of Secure Internet of Things
مصطلحات موضوعية: Computer science, business.industry, media_common.quotation_subject, Probabilistic logic, ComputingMilieux_LEGALASPECTSOFCOMPUTING, Deception, Computer security, computer.software_genre, Task (project management), symbols.namesake, Development (topology), Nash equilibrium, Node (computer science), symbols, Tree network, The Internet, business, computer, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::36ddf1f89b6d0875d06a3be5397edf10Test
https://doi.org/10.1002/9781119593386.ch6Test -
9
المؤلفون: Jeffrey Spaulding, Charles A. Kamhoua, DaeHun Nyang, Sachin Shetty, Muhammad Saad, Laurent Njilla, David Mohaisen
المصدر: IEEE Communications Surveys & Tutorials. 22:1977-2008
مصطلحات موضوعية: Application Context, Blockchain, Smart contract, Computer science, business.industry, Data_MISCELLANEOUS, 020206 networking & telecommunications, Denial-of-service attack, Cryptography, 02 engineering and technology, Attack surface, Computer security, computer.software_genre, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, DNS spoofing, Electrical and Electronic Engineering, business, computer, Block (data storage)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::463fc6a080f909b1d5c410841bc472baTest
https://doi.org/10.1109/comst.2020.2975999Test -
10
المؤلفون: Xueping Liang, Charles A. Kamhoua, Laurent Njilla, Sachin Shetty, Deepak K. Tosh
المصدر: IEEE Consumer Electronics Magazine. 8:38-44
مصطلحات موضوعية: 0209 industrial biotechnology, Provenance, Cryptographic primitive, business.industry, Computer science, Software development, Cloud computing, 02 engineering and technology, Computer security, computer.software_genre, Virtualization, Computer Science Applications, Human-Computer Interaction, 020901 industrial engineering & automation, Hardware and Architecture, 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, Information system, Overhead (computing), Electrical and Electronic Engineering, Architecture, business, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::4eca7fb2297347bd95cb9d3602b1aeb9Test
https://doi.org/10.1109/mce.2019.2892222Test