| Performance Analysis of Hyperledger Fabric Platforms |
21 |
| Security and Privacy in the Medical Internet of Things: A Review |
16 |
| A DDoS Attack Detection Method Based on SVM in Software Defined Network |
15 |
| A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack |
15 |
| A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection |
14 |
| New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment |
13 |
| Detecting Malware with an Ensemble Method Based on Deep Neural Network |
13 |
| Perceptual Hashing-Based Image Copy-Move Forgery Detection |
12 |
| Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant |
11 |
| DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation |
10 |
| Moving Target Defense Techniques: A Survey |
9 |
| Defending against the Advanced Persistent Threat: An Optimal Control Approach |
9 |
| An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization |
9 |
| Use of Data Visualisation for Zero-Day Malware Detection |
8 |
| Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms |
7 |
| An Evolutionary Computation Based Feature Selection Method for Intrusion Detection |
7 |
| Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems |
7 |
| Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis |
7 |
| A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT |
6 |
| An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks |
6 |
| Integrity Audit of Shared Cloud Data with Identity Tracking |
6 |
| Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT |
6 |
| Quantum Cryptography for the Future Internet and the Security Analysis |
6 |
| A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents |
6 |
| Distance Measurement Methods for Improved Insider Threat Detection |
6 |
| Novel Meaningful Image Encryption Based on Block Compressive Sensing |
5 |
| 5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks |
5 |
| Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks |
5 |
| Vulnerability Analysis of Network Scanning on SCADA Systems |
5 |
| Secure Virtualization Environment Based on Advanced Memory Introspection |
5 |
| Blockchain Based Credibility Verification Method for IoT Entities |
5 |
| To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers |
5 |
| High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis |
5 |
| Towards a Novel Trust-Based Multicast Routing for VANETs |
5 |
| Analysis on Matrix GSW-FHE and Optimizing Bootstrapping |
5 |
| Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning |
5 |
| Survey of Authentication and Authorization for the Internet of Things |
4 |
| A Survey on Security-Aware Measurement in SDN |
4 |
| Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks |
4 |
| Leverage Website Favicon to Detect Phishing Websites |
4 |
| A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks |
4 |
| Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System |
4 |
| Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group |
4 |
| Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks |
4 |
| A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups |
4 |
| An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map |
4 |
| Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands |
4 |
| OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN |
4 |
| A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map |
4 |
| TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest |
4 |