Your selections:
Implementation of Techniques for Enhancing Security of Southbound Infrastructure in SDN
- Tupakula, Uday, Karmakar, Kallol Krishna, Varadharajan, Vijay, Collins, Ben
SafeCX: a framework for safe customer experience in omnichannel retailing
- Rahman, Syed Mahmudur, Carlson, Jamie, Chowdhury, Noman H.
SDPM: a secure smart device provisioning and monitoring service architecture for smart network infrastructure
- Karmakar, Kallol Krishna, Varadharajan, Vijay, Speirs, Pete, Hitchens, Michael, Robertson, Aron
A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
- Chaudhry, Shehzad Ashraf, Irshad, Azeem, Khan, Muhammad Asghar, Khan, Sajjad Ahmad, Nosheen, Summera, AlZubi, Ahmad Ali, Zikria, Yousaf Bin
On converse results for secure index coding
- Liu, Yucheng, Ong, Lawrence, Sadeghi, Parastoo, Aboutorab, Neda, Sharififar, Arman
The vulnerability of cyber-physical system under stealthy attacks
- Sui, Tianju, Mo, Yilan, Marelli, Damian, Sun, Ximing, Fu, Minyue
- Nasir, Adeel, Shaukat, Kamran, Khan, Kanwal Iqbal, Hameed, Ibrahim A., Alam, Talha Mahboob, Luo, Suhuai
- Pal, Shantanu, Hitchens, Michael, Varadharajan, Vijay
Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security
- Sood, Keshav, Karmakar, Kallol Krishna, Yu, Shui, Varadharajan, Vijay, Pokhrel, Shiva Raj, Xiang, Yong
Cyber attacks in smart grid - dynamic impacts, analyses and recommendations
- Amin, B. M. Ruhul, Taghizadeh, Seyedfoad, Rahman, Md. Shihanur, Hossain, Md. Jahangir, Varadharajan, Vijay, Chen, Zhiyong
The Politics of Water Rights: Scarcity, Sovereignty and Security
- Brisman, Avi, McClanahan, Bill, South, Nigel, Walters, Reece
The search for an integrated policy: challenges to Australian national interest in the Asia-Pacific, 1921–57
A policy-based security architecture for software defined networks
- Varadharajan, Vijay, Karmakar, Kallol, Tupakula, Uday, Hitchens, Michael
A set of experience-based smart synergy security mechanism in internet of vehicles
- Li, Fei, Zhang, Haoxi, Gao, Lulu, Wang, Juan, Sanin, Cesar, Szczerbicki, Edward
Policy-based access control for constrained healthcare resources in the context of the Internet of Things
- Pal, Shantanu, Hitchens, Michael, Varadharajan, Vijay, Rabehaja, Tahiry
SDN-capable IoT Last-Miles: Design challenges
- Sood, Keshav, Pokhrel, Shiva Raj, Karmakar, Kallol, Vardharajan, Vijay, Yu, Shui
Security risk and cost-benefit assessment of secondary flight deck barriers
- Stewart, Mark G., Mueller, John
A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- Mishra, Preeti, Varadharajan, Vijay, Tupakula, Uday, Pilli, Emmanuel S.
Generalized FDIA-based cyber topology attack with application to the Australian electricity market trading mechanism
- Liang, Gaoqi, Weller, Steven R., Luo, Fengji, Zhao, Junhua, Dong, Zhao Yang
Modelling and simulation of a new cloud computing platform based on the SPEEDOS operating system
Are you sure you would like to clear your session, including search history and login status?