Searched for: contributor%3A%22Lal%2C+C.+%28mentor%29%22
(1 - 20 of 29)

Pages

Mitigating IoT data management security concerns through blockchain and machine learning based solutions
Mitigating IoT data management security concerns through blockchain and machine learning based solutions: Study and Conceptual Design
Improving security and efficiency in IoT data management using BC based solutions
Improving security and efficiency in IoT data management using BC based solutions
Blockchain-empowered federated learning based solutions for Internet of Things security, privacy, and performance
Blockchain-empowered federated learning based solutions for Internet of Things security, privacy, and performance
Machine Learning-based Techniques for Secure and Efficient IoT Data Management
Machine Learning-based Techniques for Secure and Efficient IoT Data Management
Privacy Protection and Performance Enhancement in IoT Applications using Blockchain and Machine Learning Techniques
Privacy Protection and Performance Enhancement in IoT Applications using Blockchain and Machine Learning Techniques
Methodological Considerations in Exploit Prediction Systems
Methodological Considerations in Exploit Prediction Systems
Model-specific Explainable Artificial Intelligence techniques: State-of-the-art, Advantages and Limitations
Model-specific Explainable Artificial Intelligence techniques: State-of-the-art, Advantages and Limitations
Controller-Related Security Risks and Vulnerabilities in Software-Defined Networking
Controller-Related Security Risks and Vulnerabilities in Software-Defined Networking
Study the impact of topology-related attacks in Software Defined Network
Study the impact of topology-related attacks in Software Defined Network
Study Of The Impact Of Side-channel Attacks On Software Defined Networks
Study Of The Impact Of Side-channel Attacks On Software Defined Networks
Analysing different Distributed Denial of Service (DDoS) attacks and its solutions in SDN
Analysing different Distributed Denial of Service (DDoS) attacks and its solutions in SDN
Investigation of the evaluation techniques and tools used for model-specific XAI models
Investigation of the evaluation techniques and tools used for model-specific XAI models
Model-Agnostic XAI Models: Benefits, Limitations and Research Directions
Model-Agnostic XAI Models: Benefits, Limitations and Research Directions
Investigation and Comparison of Evaluation Methods of Model-Agnostic Explainable AI Models
Investigation and Comparison of Evaluation Methods of Model-Agnostic Explainable AI Models
Explainable Artificial Intelligence (XAI) Techniques - A Review and Case Study
Explainable Artificial Intelligence (XAI) Techniques - A Review and Case Study
Analyzing Flow Rule Attacks and Policy Enforcement in Software Defined Networking
Analyzing Flow Rule Attacks and Policy Enforcement in Software Defined Networking
T-TRAIL: Preventing Decreased Rank Attacks in RPL-based IoT Networks
T-TRAIL: Preventing Decreased Rank Attacks in RPL-based IoT Networks
STIR: Preventing Routing Table Overload Attacks in RPL-based IoT Networks
STIR: Preventing Routing Table Overload Attacks in RPL-based IoT Networks
RPL Attack Analysis: Evaluation of a Cryptography-Based Sybil Defence in IEEE 802.15.4
RPL Attack Analysis: Evaluation of a Cryptography-Based Sybil Defence in IEEE 802.15.4
The performance of the routing protocol for low-power and lossy networks in mobile networks
The performance of the routing protocol for low-power and lossy networks in mobile networks
Searched for: contributor%3A%22Lal%2C+C.+%28mentor%29%22
(1 - 20 of 29)

Pages