Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
158 | Anirudh Devgan, Ronald A. Rohrer |
Efficient simulation of interconnect and mixed analog-digital circuits in ACES. |
VLSI Design |
1995 |
DBLP DOI BibTeX RDF |
adaptively controlled explicit simulation, mixed analog-digital circuits, analog circuit simulation, interconnect circuit simulation, AWE macromodels, nonlinear terminations, variable accuracy device models, circuit topology constraints removal, timing, circuit analysis computing, transient analysis, analogue integrated circuits, integrated circuit interconnections, mixed analogue-digital integrated circuits, ACES, transient simulation, timing simulation |
82 | Chao Wang 0001, Bing Li, HoonSang Jin, Gary D. Hachtel, Fabio Somenzi |
Improving Ariadneýs Bundle by Following Multiple Threads in Abstraction Refinement. |
ICCAD |
2003 |
DBLP DOI BibTeX RDF |
|
72 | Iulia Dragomir, Susanne Graf, Gabor Karsai, Florian Noyrit, Iulian Ober |
Introduction to ACES-MB 2015. |
ACES-MB&WUCOR@MoDELS |
2015 |
DBLP BibTeX RDF |
|
66 | Jason Cong, Chunyue Liu, Glenn Reinman |
ACES: application-specific cycle elimination and splitting for deadlock-free routing on irregular network-on-chip. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
application-specific Network-on-Chip, deadlock-free routing |
61 | Boon Toh Low, H. C. Lui, Ah-Hwee Tan, H. H. Teh |
Connectionist Expert System with Adaptive Learning Capability. |
IEEE Trans. Knowl. Data Eng. |
1991 |
DBLP DOI BibTeX RDF |
adaptive learning capability, neural network expert system, adaptive connectionist expert system, past experience, neural logic network, pattern processing, logical inferencing, pattern matching ACES, rule inferencing ACES, past examples, neural logic network, pattern recognition, expert systems, adaptive systems, neural nets, inference mechanisms |
61 | Anirudh Devgan, Ronald A. Rohrer |
Adaptively controlled explicit simulation. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
1994 |
DBLP DOI BibTeX RDF |
|
47 | Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam (eds.) |
Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Nibras Abdullah, Selvakumar Manickam, Mohammed Anbar (eds.) |
Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza |
Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Qais Saif Qassim, Norziana Jamil, Mohammed Najah Mahdi, Zaihisma Che Cob, Fiza Abdul Rahim, Lariyah Mohd Sidek |
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Kinan Keshkeh, Aman Jantan, Kamal Alieyan, Usman Mohammed Gana |
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Bui Thanh Khoa, Nguyen Duong Thuc Vi |
Consumer Information Sharing in Facebook: The Negative Role of Perceived Privacy Risk. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Mohammad A. Aladaileh |
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Rafia Afzal, Raja Kumar Murugesan |
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi |
Optimized Stacking Ensemble Model to Detect Phishing Websites. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Abdulkareem A. Hezam, Salama A. Mostafa, Azizul Azhar Ramli, Hairulnizam Mahdin, Bashar Ahmed Khalaf |
Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous Sensors. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Nor Ika Shahirah Ramli, Syifak Izhar Hisham, Gran Badshah |
Analysis of File Carving Approaches: A Literature Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Waddah Saeed |
Comparison of Automated Machine Learning Tools for SMS Spam Message Filtering. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Joanna Hazaline Binti Johny, Wafa Athilah Fikriah Binti Nordin, Nurrina Mizana Binti Lahapi, Yu-Beng Leau |
SQL Injection Prevention in Web Application: A Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Jason Chia, Ji-Jian Chin, Sook-Chin Yip |
Pluggable Authentication Module Meets Identity-Based Identification. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Faraz Masood, Arman Rasool Faridi |
A Blockchain Framework to Increase the Security and Verifiability of Educational Certificates. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Abdullateef Oluwagbemiga Balogun, Kayode S. Adewole, Amos Orenyi Bajeh, Rasheed Gbenga Jimoh |
Cascade Generalization Based Functional Tree for Website Phishing Detection. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Vu Le, Ramin Moazeni, Melody Moh |
Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Fadi Abu Zwayed, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam |
Intrusion Detection Systems in Fog Computing - A Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Ali Haider Shamsan, Arman Rasool Faridi |
Security Issues and Challenges in SDN. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf |
A Conceptual Model to Identify Illegal Activities on the Bitcoin System. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Reem Alshamy, Mossa Ghurab, Suad Othman, Faisal Alshami |
Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest Algorithm. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Ibrahim M. Ahmed, Manar Younis Kashmoola |
Threats on Machine Learning Technique by Data Poisoning Attack: A Survey. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Gerard Ward, Lech J. Janczewski |
Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer |
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Rao Faizan Ali, Amgad Muneer, P. D. D. Dominic, Shakirah Mohd Taib, Ebrahim A. A. Ghaleb |
Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Munaza Farooq, Aqsa Ashraf Makhdomi, Iqra Altaf Gillani |
Blockchain-Based Incentive Mechanism to Combat Fake News. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Poornima Mahadevappa, Raja Kumar Murugesan |
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Navaneethan C. Arjuman, Selvakumar Manickam, Shankar Karuppayah |
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Abhilash Kumar Das, Nirmalya Kar |
g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $\varGamma \Big (-\frac{\alpha }{\beta }\Big ) = -\frac{\beta }{\alpha }\, \varGamma \Big (\frac{\beta -\alpha }{\beta }\Big )$. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Alexander Kreppein, Alexander Kies, Robert H. Schmitt |
Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Amrita Shivanand Hedge, M. N. Vinutha, Kona Supriya, S. Nagasundari, Prasad B. Honnavalli |
CLH: Approach for Detecting Deep Fake Videos. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Haidar Raad Shakir, Suhad Abbas Yassir |
Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde |
An Implementation of Robust User Authentication Technique for Big Data Platform. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Alwan Abdullah, Shams-ul-Arfeen Laghari, Ashish Jaisan, Shankar Karuppayah |
OSINT Explorer: A Tool Recommender Framework for OSINT Sources. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Noor Al-Mi'ani, Mohammed Anbar, Yousef K. Sanjalawe, Shankar Karuppayah |
Securing Software Defined Networking Using Intrusion Detection System - A Review. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Fatina Shukur |
Analysing Security Concerns About the Massive Increase of Sharing Data over the Cloud During the Pandemic of Covid-19. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed |
Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Jamal N. Hasoon, Bashar Ahmed Khalaf, Rasha Subhi Hameed, Salama A. Mostafa, Ali Hussein Fadil |
A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. |
ACeS |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam (eds.) |
Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Yudhi Fajar Saputra, Mahmoud Ahmad Al-Khasawneh |
Big Data Analytics: Schizophrenia Prediction on Apache Spark. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Abdul Alif Zakaria, A. H. Azni 0001, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud |
Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Victor Elijah Adeyemo, Abdullateef Oluwagbemiga Balogun, Hammed Adeleye Mojeed, Noah Oluwatobi Akande, Kayode S. Adewole |
Ensemble-Based Logistic Model Trees for Website Phishing Detection. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Jetli Chung, Jing-Zhi Koay, Yu-Beng Leau |
A Review on Social Media Phishing: Factors and Countermeasures. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Hasanen Alyasiri |
Evolving Rules for Detecting Cross-Site Scripting Attacks Using Genetic Programming. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Azmi Shawkat Abdulbaqi, Salwa Mohammed Nejrs, Sawsan D. Mahmood, Ismail Yusuf Panessai |
A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Mohammed Shuaib, Shadab Alam, Salwani Mohd Daud |
Improving the Authenticity of Real Estate Land Transaction Data Using Blockchain-Based Security Scheme. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Jun-Ming Gan, Hang-Yek Ling, Yu-Beng Leau |
A Review on Detection of Cross-Site Scripting Attacks (XSS) in Web Security. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Uzma Jafar, Mohd Juzaiddin Ab Aziz |
A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Ayman Khalil, Murtadha A. Alazzawi, Ahmed Shakir Al-Hiti |
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Abdullateef Oluwagbemiga Balogun, Shuib Basri, Said Jadid Abdulkadir, Saipunidzam Mahamad, Malek Ahmad Theeb Almomani, Abdullahi Abubakar Imam, Ganesh M. Kumar |
Rank Aggregation Based Multi-filter Feature Selection Method for Software Defect Prediction. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Yichiet Aun, Yen-Min Jasmina Khaw, Ming-Lee Gan, Vasaki Ponnusamy |
Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Catherine Lim Siew-Hong, Yu-Beng Leau |
A Performance Study of a Modified Grey Network Traffic Prediction Mechanism. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad, Engku Fadzli Hasan Syed Abdullah, Waheed Ali H. M. Ghanem |
An Integrated Model to Email Spam Classification Using an Enhanced Grasshopper Optimization Algorithm to Train a Multilayer Perceptron Neural Network. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Riya Khan, Nitesh Kumar, Anand Handa, Sandeep K. Shukla |
Malware Detection in Word Documents Using Machine Learning. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Jason Chia, Ji-Jian Chin, Sook-Chin Yip |
Evaluating Pairing-Free Identity-Based Identification Using Curve25519. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Abhilash Kumar Das, Nirmalya Kar |
A Novel Approach of Text Encryption Using Random Numbers and Hash Table. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Qais Saif Qassim, Norziana Jamil, Maslina Daud, Norhamadi Ja'affar, Wan Azlan Wan Kamarulzaman, Mohammed Najah Mahdi |
Compromising the Data Integrity of an Electrical Power Grid SCADA System. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Minhaz Bin Farukee, M. S. Zaman Shabit, Md. Rakibul Haque, A. H. M. Sarowar Sattar |
DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Bahareh Pahlevanzadeh, Sara Koleini, Suzi Iryanti Fadilah |
Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Poornima Mahadevappa, Raja Kumar Murugesan |
Study of Container-Based Virtualisation and Threats in Fog Computing. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Yean Li Ho, Michael Teck Hong Gan, Siong-Hoe Lau, Afizan Azman |
Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Nor Azlina Ali, Zalizah Awang Long, Mohd Nizam Husen, Tawfik Al Hadhrami, Hideya Ochiai |
SMOTE-Based Framework for IoT Botnet Attack Detection. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Salam Al-Emari, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam |
A Labeled Transactions-Based Dataset on the Ethereum Network. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Tohari Ahmad, Herdito Ibnu Dewangkoro, Waskitho Wibisono, Royyana Muslim Ijtihadie |
Protecting Data by Improving the Performance of Controlling Expansion Method. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Kean-Wah Cheng, Swee-Huay Heng |
Blockchain-Based Content Sharing and Data Repository System. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Kartikeya Gaur, Nitesh Kumar, Anand Handa, Sandeep K. Shukla |
Static Ransomware Analysis Using Machine Learning and Deep Learning Models. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Sarah K. Taylor, M. Sharizuan M. Omar, Nooraiman Noorashid, Aswami Ariffin, K. Akram Z. Ariffin, S. N. Huda S. Abdullah |
People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Usman Mohammed Gana, Aman Jantan, Mohd Najwadi Yusoff, Ibrahim Abdullahi, Muhammad Ubale Kiru, Abdullahi Aminu Kazaure |
Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Ali Abdulrazzaq, Awos Kh. Ali, Supriyanto Praptodiyono |
The Impact of Elliptic Curves Name Selection to Session Initiation Protocol Server. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Antony Taurshia, G. Jaspher W. Kathrine |
Software Defined Networks Centered Group Based Access Control Service for Internet of Things Applications. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Amir Zulhilmi, Salama A. Mostafa, Bashar Ahmed Khalaf, Aida Mustapha, Siti Solehah Tenah |
A Comparison of Three Machine Learning Algorithms in the Classification of Network Intrusion. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar |
The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad, Engku Fadzli Hasan Syed Abdullah, Waheed Ali H. M. Ghanem |
Spam Classification Based on Supervised Learning Using Grasshopper Optimization Algorithm and Artificial Neural Network. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Murtadha A. Alazzawi, Hasanain Abbas Hasan Al-Behadili, Mohsin N. Srayyih Almalki, Aqeel Luaibi Challoob, Mahmood Al Shareeda |
ID-PPA: Robust Identity-Based Privacy-Preserving Authentication Scheme for a Vehicular Ad-Hoc Network. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Zi Hau Chin, Timothy Tzen Vun Yap, Ian K. T. Tan |
Proof-of-Work Difficulty Readjustment with Genetic Algorithm. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar |
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Assim Sulaiman Khaled, Yvonne Hwei-Syn Kam |
Face-Based Graphical Authentication System Using Hybrid Images. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Abdulla J. Y. Aldarwish, Ali A. Yassin, Abdullah Mohammed Rashid, Aqeel A. Yaseen, Hamid Ali Abed Al-Asadi, Ahmed A. Alkadhmawee |
Multi-factor Authentication for an Administrator's Devices in an IoT Environment. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Waheed Ali H. M. Ghanem, Yousef A. Baker El-Ebiary, Mohamed Abdulnabi, Mohammad Tubishat, Nayef Abdulwahab Mohammed Alduais, Abdullah B. Nasser, Nibras Abdullah, Ola Ahmed Al-wesabi |
Metaheuristic Based IDS Using Multi-objective Wrapper Feature Selection and Neural Network Classification. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Nazrool Omar, Selvakumar Manickam |
Rule-Based SLAAC Attack Detection Mechanism. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Collins Uchenna Chimeleze, Norziana Jamil, Roslan Ismail, Kwok-Yan Lam |
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | W. Q. Janie Lee, Thian Song Ong, Tee Connie, H. T. Jackson |
Finger Vein Presentation Attack Detection with Optimized LBP Variants. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Ranil Lee Kotalawela, Jun Hong Lee, Wan Wah Chuah, Kai Wen Luo, Lokman Mohd Fadzil |
Proposal for Physiological-Resilience Usability Model in Security-Enhanced Mobile Application for Secure Travel. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Tee Wee Jing, Raja Kumar Murugesan |
Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Shatha A. Baker, Ahmed S. Nori |
Internet of Things Security: A Survey. |
ACeS |
2020 |
DBLP DOI BibTeX RDF |
|
47 | Ahmed M. Elmisery, Mirela Sertovic |
Privacy Preserving Threat Hunting in Smart Home Environments. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
47 | Philip Lebedev, Konstantin Kogos, Egor Vasilenko |
On Way to Simplify the Reverse Engineering of UEFI Firmwares. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
47 | Yichiet Aun, Ming-Lee Gan, Yen-Min Jasmina Khaw |
Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
47 | Zhen-Kai Wong, Swee-Huay Heng |
Blockchain-Based Image Sharing Application. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
47 | Ji-Jian Chin, Yvonne Hwei-Syn Kam, Vik Tor Goh |
Vulnerabilities in Online Food Ordering Website. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
47 | Christine Lim Xin Yi, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin |
Appraisal on User's Comprehension in Security Warning Dialogs: Browsers Usability Perspective. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
47 | Hala A. Albaroodi, Mohammed Abomaali, Selvakumar Manickam |
Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
47 | Syeda Mariam Muzammal, Raja Kumar Murugesan |
A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|
47 | Vasaki Ponnusamy, Chan Mee Yee, Adnan Bin Amanat Ali |
Mobile Authentication Using Tapping Behavior. |
ACeS |
2019 |
DBLP DOI BibTeX RDF |
|