All Stories

  1. Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence
  2. An efficient hybrid SVDD/clustering approach for anomaly-based intrusion detection
  3. Secure Device-to-Device (D2D) Communications
  4. Efficient centralized approach to prevent from replication attack in wireless sensor networks