Your selections:
A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- Mishra, Preeti, Varadharajan, Vijay, Tupakula, Uday, Pilli, Emmanuel S.
A flexible authentication and authorisation mechanism for securing transactions in digital ecosystem
- Pranata, Ilung, Skinner, Geoff, Athauda, Rukshan
A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
- Chaudhry, Shehzad Ashraf, Irshad, Azeem, Khan, Muhammad Asghar, Khan, Sajjad Ahmad, Nosheen, Summera, AlZubi, Ahmad Ali, Zikria, Yousaf Bin
A novel malware for subversion of self-protection in anti-virus
- Min, Byungho, Varadharajan, Vijay
A policy-based security architecture for software defined networks
- Varadharajan, Vijay, Karmakar, Kallol, Tupakula, Uday, Hitchens, Michael
A prototype design for enhancing customer trust in online payments
- Al-Dala'in, Thair, Summons, Peter, Luo, Suhuai
A review of current online payment systems related to security and trust solutions
- Al-Dala'in, Thair, Luo, Suhuai, Summons, Peter
A risk and cost-benefit assessment of United States aviation security measures
- Stewart, Mark, Mueller, John
A security extension for securing the feedback & rating values in TIDE framework
- Pranata, Ilung, Skinner, Geoff
A set of experience-based smart synergy security mechanism in internet of vehicles
- Li, Fei, Zhang, Haoxi, Gao, Lulu, Wang, Juan, Sanin, Cesar, Szczerbicki, Edward
- Pal, Shantanu, Hitchens, Michael, Varadharajan, Vijay
Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security
- Sood, Keshav, Karmakar, Kallol Krishna, Yu, Shui, Varadharajan, Vijay, Pokhrel, Shiva Raj, Xiang, Yong
Antivirus security: naked during updates
- Min, Byungho, Varadharajan, Vijay, Tapakula , Udaya, Hitchens, Michael
Application based meta tagging of network connections
- Wallis, Mark, Henskens, Frans, Hannaford, Michael
Assemblage, counter-law and the legal architecture of Australian covert surveillance
- Murphy, Brendon, Anderson, John
Australian regional strategy, terrorism and the risk of asymmetric warfare
Aviation security, risk assessment, and risk aversion for public decisionmaking
- Stewart, Mark G., Mueller, John
Cost-benefit analysis of advanced imaging technology full body scanners for airline passenger security screening
- Stewart, Mark G., Mueller, John
Cost-benefit analysis of airport security: are airports too safe?
- Stewart, Mark G., Mueller, John
Are you sure you would like to clear your session, including search history and login status?