Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Enhanced Brute Force Attack Detection in Remote Access Security: Integrating ANN and SVM
Kumari, Ankita, Gupta, Deepali, Uppal, Mudita
Published in 2024 Asia Pacific Conference on Innovation in Technology (APCIT) (26.07.2024)
Published in 2024 Asia Pacific Conference on Innovation in Technology (APCIT) (26.07.2024)
Get full text
Conference Proceeding
Quantifying computational security subject to source constraints, guesswork and inscrutability
Beirami, Ahmad, Calderbank, Robert, Duffy, Ken, Medard, Muriel
Published in Proceedings / IEEE International Symposium on Information Theory (01.06.2015)
Published in Proceedings / IEEE International Symposium on Information Theory (01.06.2015)
Get full text
Conference Proceeding
Journal Article
Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol
Chauhan, D.S., Sehgal, V.K., Mahanot, A., Singh, P., Ahuja, S., Shrivastava, U., Rana, M., Punjabi, V., Vinay, S., Sharma, N.
Published in 7th IEEE/ACIS International Conference on Computer and Information Science] : (IEEE/ACIS ICIS 2008), in conjunction with 2nd IEEE/ACIS International Workshop on e-Activity : (IEEE/ACIS IWEA 2008) : proceedings, 14-16 May 2008, Portland, Oregon (01.05.2008)
Published in 7th IEEE/ACIS International Conference on Computer and Information Science] : (IEEE/ACIS ICIS 2008), in conjunction with 2nd IEEE/ACIS International Workshop on e-Activity : (IEEE/ACIS IWEA 2008) : proceedings, 14-16 May 2008, Portland, Oregon (01.05.2008)
Get full text
Conference Proceeding
Security establishment using deep convolutional network model in cyber-physical systems
Meganathan, R., B, Manjunath, Anand, R., Murugesh, V.
Published in Multimedia tools and applications (01.09.2024)
Published in Multimedia tools and applications (01.09.2024)
Get full text
Journal Article
Method and system for issuing and using derived credentials
Year of Publication 11.06.2019
Get full text
Patent
Method and system for issuing and using derived credentials
Year of Publication 05.08.2016
Get full text
Patent
PALPAS -- PAssword Less PAssword Synchronization
Horsch, Moritz, Hulsing, Andreas, Buchmann, Johannes
Published in 2015 10th International Conference on Availability, Reliability and Security (01.08.2015)
Published in 2015 10th International Conference on Availability, Reliability and Security (01.08.2015)
Get full text
Conference Proceeding
Image Encryption Based on AES Key Expansion
Subramanyan, B, Chhabria, V M, Babu, T G S
Published in 2011 Second International Conference on Emerging Applications of Information Technology (01.02.2011)
Published in 2011 Second International Conference on Emerging Applications of Information Technology (01.02.2011)
Get full text
Conference Proceeding