From post

FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation.

, , , , , и . QSHINE, том 402 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-24. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Controller Agent Model to Counteract DoS Attacks in Multiple Domains., и . Integrated Network Management, том 246 из IFIP Conference Proceedings, стр. 113-116. Kluwer, (2003)Improving Software Security Through an Integrated Approach., , и . SECRYPT, стр. 437-442. INSTICC Press, (2006)Analysis of traceback techniques., и . ACSW, том 54 из CRPIT, стр. 115-124. Australian Computer Society, (2006)Towards a Generic Logic for Analysing Network Protocols., , и . ICDCS Workshop on Internet, стр. A19-A26. (2000)A novel dynamic key management scheme for secure multicasting., , и . ICON, стр. 391-395. IEEE, (2003)A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks., , , , и . MobiQuitous, том 73 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 186-197. Springer, (2010)A Formal Security Design Approach for Transformation of Authorizations in Information Systems., и . PACIS, стр. 81. AISeL, (1997)Integration of Graph Based Authorization Policies., и . ISMIS, том 4203 из Lecture Notes in Computer Science, стр. 359-368. Springer, (2006)Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications., , , и . ICICS, том 1726 из Lecture Notes in Computer Science, стр. 103-118. Springer, (1999)A Secure Object Sharing Scheme for Java Card., , и . ICICS, том 2513 из Lecture Notes in Computer Science, стр. 243-251. Springer, (2002)