-
41
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
Published 2023-12-01Get full text
Article -
42
-
43
Deep Recurrent Model for Server Load and Performance Prediction in Data Center
Published 2017-01-01Get full text
Article -
44
-
45
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
Published 2021-01-01Get full text
Article -
46
Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service
Published 2017-01-01Get full text
Article -
47
Increasing the cyber resilience of SMEs through open-source solutions and international collaboration
Published 2025-01-01Get full text
Article -
48
A Two-Stage Greedy Genetic Algorithm for Simultaneous Delivery and Monitoring Tasks with Time Windows
Published 2025-01-01Get full text
Article -
49
-
50
-
51
An Improved Harmony Search Algorithm for Proactive Routing Protocol in VANET
Published 2021-01-01Get full text
Article -
52
Understanding the Behavioral Differences Between American and German Users: A Data-Driven Study
Published 2018-12-01Get full text
Article -
53
Mathematical Modeling of Cyberattack Defense Mechanism Using Hybrid Transfer Learning With Snow Ablation Optimization Algorithm in Critical Infrastructures
Published 2025-01-01“…To certify the security of critical infrastructures, numerous cyber security solutions must be taken together and the essential infrastructure must be developed. …”
Get full text
Article -
54
An Event Causality Identification Framework Using Ensemble Learning
Published 2025-01-01Get full text
Article -
55
-
56
A hybrid model of extended FMEA model based on F-PIPRECIA and Z-EDAS methods with Bow Tie to evaluate cybersecurity risks in Industry 4.0
Published 2024-03-01“…Cyber security issues have become a complex challenge for companies that obligating to Industry 4.0 paradigm. …”
Get full text
Article -
57
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01Get full text
Article -
58
-
59
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01Get full text
Article -
60
Analyzing Key Features of Open Source Software Survivability with Random Forest
Published 2025-01-01Get full text
Article