-
1
-
2
-
3by Qianwen Pei, Burong Kang, Lei Zhang, Kim-Kwang Raymond Choo, Yuanfei Zhang, Yinxia SunSubjects: “...Vehicular ad hoc network...”
Published 2018-11-01
Get full text
Article -
4
-
5
-
6by Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond ChooSubjects: “...Cyber security...”
Published 2020-05-01
Get full text
Article -
7
-
8
-
9
-
10
-
11“... in our Internet-connected society. Ensuring the security of communications between devices is an ongoing...”
Get full text
Article -
12“... strategies to defend against cyber-attacks is the migration process. A secure Virtual Machine (VM) migration...”
Get full text
Article -
13
-
14“...Blockchain uses a peer-to-peer (P2P) network, rather than a central authority (e.g., a central bank...”
Get full text
Article -
15“...Authenticated key exchange protocols are of fundamental importance in securing communications...”
Get full text
Article -
16by Sidra Zafar, Mohsin Nazir, Taimur Bakhshi, Hasan Ali Khattak, Sarmadullah Khan, Muhammad Bilal, Kim-Kwang Raymond Choo, Kyung-Sup Kwak, Aneeqa SabahSubjects: “...bio-electronic device security...”
Published 2021-01-01
Get full text
Article -
17by Ibrahim Radwan, Nour Moustafa, Byron Keating, Kim-Kwang Raymond Choo, Roland GoeckeSubjects: “...generative adversarial network...”
Published 2019-01-01
Get full text
Article -
18
-
19by Zhiyong Zhang, Ranran Sun, Kim-Kwang Raymond Choo, Kefeng Fan, Wei Wu, Manhua Zhang, Changwei ZhaoSubjects: “...Multimedia social networks...”
Published 2019-01-01
Get full text
Article -
20by Shahzeb Haider, Adnan Akhunzada, Iqra Mustafa, Tanil Bharat Patel, Amanda Fernandez, Kim-Kwang Raymond Choo, Javed IqbalSubjects: “...Software defined network (SDN)...”
Published 2020-01-01
Get full text
Article