Ajou University repository

  • Results/Page
  • Sort by
  • In order
  • Authors/record

Showing results 1 to 10 of 2358 (Search time: 0.0 seconds).

System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats
  • 2018-02-28
  • KSII Transactions on Internet and Information Systems, Vol.12, pp.906-918
  • Korean Society for Internet Information
Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environmentoa mark
  • 2022-01-01
  • Computers, Materials and Continua, Vol.73, pp.199-223
  • Tech Science Press
Security, privacy, and reliability in digital healthcare systems using blockchainoa mark
  • Ali, Aitizaz;
  • Rahim, Hasliza A.;
  • Pasha, Muhammad Fermi;
  • Dowsley, Rafael;
  • Masud, Mehedi;
  • Ali, Jehad;
  • Baz, Mohammed
  • 2021-08-02
  • Electronics (Switzerland), Vol.10
  • MDPI AG
Smart card-based secure authentication protocol in multi-server IoT environmentoa mark
  • 2020-06-01
  • Multimedia Tools and Applications, Vol.79, pp.15793-15811
  • Springer
An Effective Blockchain Based Secure Searchable Encryption Systemoa mark
  • Ali, Aitizaz;
  • Masud, Mehedi;
  • Rehman, Ateeq Ur;
  • Chen, Can;
  • Mehmood,;
  • Alzain, Mohammad A.;
  • Ali, Jehad
  • 2022-01-01
  • Intelligent Automation and Soft Computing, Vol.33, pp.1183-1195
  • Tech Science Press
Security System Load Reduction in SDN
  • 2021-12-01
  • Journal of Korean Institute of Communications and Information Sciences, Vol.46, pp.2251-2261
  • Korean Institute of Communications and Information Sciences
A study on analysis of malicious code behavior information for predicting security threats in new environmentsoa mark
  • 2019-03-31
  • KSII Transactions on Internet and Information Systems, Vol.13, pp.1611-1625
  • Korean Society for Internet Information
An improved anonymous authentication scheme for distributed mobile cloud computing services
  • Chaudhry, Shehzad Ashraf;
  • Kim, I. Luk;
  • Rho, Seungmin;
  • Farash, Mohammad Sabzinejad;
  • Shon, Taeshik
  • 2019-01-16
  • Cluster Computing, Vol.22, pp.1595-1609
  • Springer New York LLC
Game theory-based Security Vulnerability Quantification for Social Internet of Things
  • 2018-05-01
  • Future Generation Computer Systems, Vol.82, pp.752-760
  • Elsevier B.V.
1 2 3 4 236