![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 60
Volume 60, August 2021
- Daniel Kelly
, Frank G. Glavin
, Enda Barrett:
Denial of wallet - Defining a looming threat to serverless computing. 102843 - Shweta Saharan, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing. 102850 - Saeed Javanmardi, Mohammad Shojafar
, Reza Mohammadi
, Amin Nazari
, Valerio Persico
, Antonio Pescapè:
FUPE: A security driven task scheduling approach for SDN-based IoT-Fog networks. 102853 - Lidong Liu, Donghua Jiang
, Xingyuan Wang, Xianwei Rong, Renxiu Zhang:
2D Logistic-Adjusted-Chebyshev map for visual color image encryption. 102854 - Jiyan Zhang
, Ting Cui, Chenhui Jin:
A generic framework for decomposing block cipher structure with secret components. 102855 - Yu Wang
, Gaopeng Gou, Chang Liu, Mingxin Cui, Zhen Li, Gang Xiong
:
Survey of security supervision on blockchain from the perspective of technology. 102859 - Mesala M. Sravani, Ananiah Durai Sundararajan:
Attacks on cryptosystems implemented via VLSI: A review. 102861 - Peng Li, Junzuo Lai, Yongdong Wu:
Event-oriented linkable and traceable anonymous authentication and its application to voting. 102865 - Dukka Karun Kumar Reddy, Himansu Sekhar Behera, Janmenjoy Nayak, Bighnaraj Naik, Uttam Ghosh, Pradip Kumar Sharma
:
Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment. 102866 - V. S. Lakshmi, Deepthi Sundaran, Deepthi P. P.:
Collusion resistant secret sharing scheme for secure data storage and processing over cloud. 102869 - Mriganka Mandal
, Ratna Dutta:
Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment. 102870 - Khaleel Ahmad, Afsar Kamal, Khairol Amali Bin Ahmad
, Manju Khari, Rubén González Crespo
:
Fast hybrid-MixNet for security and privacy using NTRU algorithm. 102872 - Gwonsang Ryu
, Hosung Park
, Daeseon Choi
:
Adversarial attacks by attaching noise markers on the face against deep face recognition. 102874 - Tina Rezaei
, Farnoush Manavi, Ali Hamzeh
:
A PE header-based method for malware detection using clustering and deep embedding techniques. 102876 - Pantaleone Nespoli
, Daniel Díaz López, Félix Gómez Mármol:
Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices. 102878 - Congyuan Xu, Jizhong Shen, Xin Du:
Low-rate DoS attack detection method based on hybrid deep neural networks. 102879
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.