AI-driven cybersecurity framework for anomaly detection in power systems. [PDF]
V M V +4 more
europepmc +1 more source
A Lightweight Key Agreement Protocol for V2X Communications Based on Kyber and Saber. [PDF]
Dai Y, Wang Q, Song X, Wang S.
europepmc +1 more source
Revisiting Cloud Security Threats Man-in-the-Middle Attack
Vaishali Singh +2 more
openaire +1 more source
Multi-factor authentication and key agreement scheme based on PUF and Chebyshev chaotic map for wireless sensor networks. [PDF]
Wang L, Han C.
europepmc +1 more source
Securing e-governance against shadow attacks with blockchain technology. [PDF]
Mishra P, R G.
europepmc +1 more source
Optimized ensemble machine learning model for cyberattack classification in industrial IoT. [PDF]
Alabdullah B, Sankaranarayanan S.
europepmc +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Syncope in AQP4-IgG-positive neuromyelitis optica spectrum disorder: a case series and literature review. [PDF]
Jin C +6 more
europepmc +1 more source
Dataset-centric evaluation of federated intrusion detection models in IoT networks. [PDF]
Bilal MA +5 more
europepmc +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source

