All
Title
Author
Keyword
Date
All
Communities
Authors
Journal
All of DSpace
Administration
Affiliated Organization
Ajou University
ETC
Graduate School of Ajou University
Professional Graduate Schools
Research Organization
Special Graduate Schools
Supporting Institution
Add filters:
Title
Type
Author
Keyword
Date Issued
Advisor
Abstract
Journal
Equals
Contains
ID
Not Equals
Not Contains
Not ID
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort by
Relevance
Title
Issue Date
In order
Ascending
Descending
Authors/record
All
1
5
10
15
20
25
30
35
40
45
50
Showing results
1
to 10 of 2035 (Search time: 0.0 seconds).
SRE_BBC: A Self‐Adaptive Security Enabled Requirements Engineering Approach for SLA Smart Contracts in Blockchain‐Based Cloud Systems
oa mark
Singh, Irish;
Lee, Seok Won
2022-05-01
Sensors, Vol.22
MDPI
Understanding and recommending security requirements from problem domain ontology: A cognitive three-layered approach
Kim, Bong Jae;
Lee, Seok Won
2020-11-01
Journal of Systems and Software, Vol.169
Elsevier Inc.
An Effective Blockchain Based Secure Searchable Encryption System
oa mark
Ali, Aitizaz;
Masud, Mehedi;
Rehman, Ateeq Ur;
Chen, Can;
Mehmood,;
Alzain, Mohammad A.;
Ali, Jehad
2022-01-01
Intelligent Automation and Soft Computing, Vol.33, pp.1183-1195
Tech Science Press
Self-Adaptive Security Requirements Engineering for Blockchain-Based Cloud Platform
IRISH SINGH
2022-08
The Graduate School, Ajou University
A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks
Ali, Jehad
;
Kumar Singh, Sushil;
Jiang, Weiwei;
Alenezi, Abdulmajeed M.;
Islam, Muhammad;
Ibrahim Daradkeh, Yousef;
Mehmood, Asif
2025-01-01
Computer Communications, Vol.229
Elsevier B.V.
Self-adaptive and secure mechanism for IoT based multimedia services: a survey
Singh, Irish;
Lee, Seok Won
2022-08-01
Multimedia Tools and Applications, Vol.81, pp.26685-26720
Springer
Enhancing Participatory Security Culture in Public Institutions: An Analysis of Organizational Employees' Security Threat Recognition Processes
oa mark
Choi, Heeyoung;
Park, Sangun;
Kang, Juyoung
2024-01-01
IEEE Access, Vol.12, pp.47543-47558
Institute of Electrical and Electronics Engineers Inc.
Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography
oa mark
Ali, Aitizaz;
Pasha, Muhammad Fermi;
Ali, Jehad
;
Fang, Ong Huey;
Masud, Mehedi;
Jurcut, Anca Delia;
Alzain, Mohammed A.
2022-01-01
Sensors, Vol.22
MDPI
Anti-collision, Security & Privacy Solutions for Radio Frequency Identification (RFID) Systems
Jia, Zhai
2006-08
The Graduate School, Ajou University
An edge inspired image watermarking approach using compass edge detector and LSB in cybersecurity
Bin Faheem, Zaid;
Hanif, Danial;
Arslan, Farrukh;
Ali, Mubashir;
Hussain, Aamir;
Ali, Jehad
;
Baz, Abdullah
2023-11-01
Computers and Electrical Engineering, Vol.111
Elsevier Ltd
1
2
3
4
next
204
필터
Discover
닫기
Author
SEO, HYUNGTAK
40
ALI JEHAD
34
SHON, TAE SHIK
28
Sohn, Kyung-Ah
22
Chung, Tae-Sun
20
Kim, Jong Hyun
19
KUMARMOHIT
19
KWAK, JIN
19
Ahn, Byungmin
17
Lee, Seok-Won
17
next >
Type
Thesis
1,085
Article
806
Review
46
Conference Paper
4
Erratum
4
Editorial
2
Keyword
Machine learning
26
Deep learning
22
IoT
18
Security
15
Blockchain
14
deep learning
14
QoS
10
SDN
10
블록체인
10
machine learning
9
next >
Date issued
2020 - 2025
982
2010 - 2019
718
2000 - 2009
242
Journal
IEEE Access
46
Electronics (Basel)
31
Sensors
25
Applied Sciences-basel
14
Computers, Materials and Continua
12
KSII Transactions on Internet and...
10
Journal of Supercomputing
9
Scientific Reports
9
Advanced Optical Materials
8
Journal of Korean Institute of Co...
8
next >