Secure convergence of artificial intelligence and internet of things for cryptographic cipher- a decision support system
暂无分享,去创建一个
Shah Nazir | Lin Shi | Liquan Chen | Rui Zhu | S. Nazir | Liquan Chen | Ruiwen Zhu | Lin Shi
[1] Mbarek Marwan,et al. Security Enhancement in Healthcare Cloud using Machine Learning , 2018 .
[2] Shah Nazir,et al. Evaluating Security of Software Components Using Analytic Network Process , 2013, 2013 11th International Conference on Frontiers of Information Technology.
[3] Wendy Ivins,et al. A multifaceted evaluation of the reference model of information assurance & security , 2016, Comput. Secur..
[4] Talita D. C. Frazão,et al. Multicriteria decision analysis (MCDA) in health care: a systematic review of the main characteristics and methodological steps , 2018, BMC Medical Informatics and Decision Making.
[5] Iván García-Magariño,et al. Internet of Things for Healthcare Using Effects of Mobile Computing: A Systematic Literature Review , 2019, Wirel. Commun. Mob. Comput..
[6] Christof Paar,et al. A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.
[7] Cheng Hong,et al. Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication , 2020, Secur. Commun. Networks.
[8] Tran Duc Chung,et al. Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review , 2020 .
[9] Nalin Asanka Gamagedara Arachchilage,et al. Using cognitive dimensions to evaluate the usability of security APIs: An empirical investigation , 2019, Inf. Softw. Technol..
[10] Dimitris Kardaras,et al. Multicriteria Evaluation of the Internet of Things Potential in Health Care: The Case of Dementia Care , 2017, 2017 IEEE 19th Conference on Business Informatics (CBI).
[11] Mojtaba Alizadeh,et al. Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .
[12] P. Subsorn,et al. A COMPARATIVE ANALYSIS OF INTERNET BANKING SECURITY IN THAILAND: A CUSTOMER PERSPECTIVE , 2012 .
[13] Srikanta Patnaik,et al. Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology , 2020, Internet Things.
[14] Muhammad Imran,et al. Deep learning and big data technologies for IoT security , 2020, Comput. Commun..
[15] Deepak Gupta,et al. Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers , 2019, Multimedia Tools and Applications.
[16] Vineet Sahula,et al. Energy Efficient Lightweight Cryptography Algorithms for IoT Devices , 2019 .
[17] Hao Hao Song,et al. Testing and Evaluation System for Cloud Computing Information Security Products , 2020 .
[18] Shah Nazir,et al. Fuzzy logic based decision support system for component security evaluation , 2018, Int. Arab J. Inf. Technol..
[19] Habib Ullah Khan,et al. Modelling Features-Based Birthmarks for Security of End-to-End Communication System , 2020, Secur. Commun. Networks.
[20] Yang Xiao,et al. Trade-off of security and performance of lightweight block ciphers in Industrial Wireless Sensor Networks , 2018, EURASIP J. Wirel. Commun. Netw..
[21] Shah Nazir,et al. Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview , 2020, Secur. Commun. Networks.
[22] Yi An,et al. Ecological security evaluation based on entropy matter-element model: A case study of Kunming city, southwest China , 2019, Ecological Indicators.
[23] Priyadarshini Patil,et al. A Comprehensive Evaluation of Cryptographic Algorithms , 2016 .
[24] Shah Nazir,et al. ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods , 2020, IEEE Access.
[25] Talal Halabi,et al. Towards quantification and evaluation of security of Cloud Service Providers , 2017, J. Inf. Secur. Appl..
[26] Zarul Fitri Zaaba,et al. A Review of Usability and Security Evaluation Model of Ecommerce Website , 2019, Procedia Computer Science.
[27] Alastair R. Ruddle,et al. Towards a systematic security evaluation of the automotive Bluetooth interface , 2017, Veh. Commun..
[28] Ahmed Oloduowo Ameen,et al. Evaluation of four encryption algorithms for viability, reliability and performance estimation , 2017 .
[29] Donald F. Towsley,et al. Security importance assessment for system objects and malware detection , 2017, Comput. Secur..
[30] Shah Nazir,et al. Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method , 2020, Secur. Commun. Networks.
[31] Zahid Ullah,et al. KNN and ANN-based Recognition of Handwritten Pashto Letters using Zoning Features , 2018 .
[32] Julia I. Drake,et al. Utilization of multiple-criteria decision analysis (MCDA) to support healthcare decision-making FIFARMA, 2016 , 2017, Journal of market access & health policy.
[33] Jin Li,et al. The security of machine learning in an adversarial setting: A survey , 2019, J. Parallel Distributed Comput..
[34] Zhiyong Zhang,et al. A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory , 2017, J. Comput. Sci..
[35] Varghese Paul,et al. A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices , 2019, Symmetry.
[36] Latifa Ben Arfa Rabai,et al. A Multidimensional Approach towards a Quantitative Assessment of Security Threats , 2015, ANT/SEIT.
[37] B Chaitra,et al. A Survey on Various Lightweight Cryptographic Algorithms on FPGA , 2017 .
[38] Iván García-Magariño,et al. A Collocation Method for Numerical Solution of Nonlinear Delay Integro-Differential Equations for Wireless Sensor Network and Internet of Things , 2020, Sensors.
[39] M. A. Kashem,et al. An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices , 2018 .
[40] Brahmjit Singh,et al. Lightweight Cryptography: A Solution to Secure IoT , 2020, Wirel. Pers. Commun..
[41] Jiahang Yuan,et al. Regional energy security performance evaluation in China using MTGS and SPA-TOPSIS. , 2019, The Science of the total environment.
[42] KumarSandeep,et al. A Survey of Lightweight-Cryptography Implementations , 2007 .
[43] Murthy V. Jonnalagedda,et al. Clustering based on correlation fractal dimension over an evolving data stream , 2018, Int. Arab J. Inf. Technol..
[44] Mohamed Abdel-Basset,et al. Neutrosophic Multi-Criteria Decision Making Approach for IoT-Based Enterprises , 2019, IEEE Access.
[45] David Bol,et al. Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint , 2012, CHES.