Discover more insights into Malicious User 악의적인 사용자

Keywords frequently search together with Malicious User 악의적인 사용자

Narrow sentence examples with built-in keyword filters

Malicious User sentence examples within sensing data falsification



Detection of Malicious Node in Centralized Cognitive Radio Networks Based on MLP Neural Network


Mitigation strategy against spectrum-sensing data falsification attack in cognitive radio sensor networks

Malicious User sentence examples within Detect Malicious User



Cyber Attack Detection by Using Neural Network Approaches: Shallow Neural Network, Deep Neural Network and AutoEncoder


Enabling Data Trustworthiness and User Privacy in Mobile Crowdsensing

Malicious User sentence examples within Identify Malicious User



Crowdsourced measurements for device fingerprinting


A Secure Private Charging Pile Sharing Scheme with Electric Vehicles in Energy Blockchain


Learn more from Malicious User 악의적인 사용자


Malicious User sentence examples within Potential Malicious User



Limits in the data for detecting criminals on social media


A Survey and a Case-Study Regarding Social Media Security and Privacy on Greek Future IT Professionals

Malicious User sentence examples within Distinguish Malicious User



On MMD-Based Secure Fusion Strategy for Robust Cooperative Spectrum Sensing


An Abnormal Login Detection Method Based on Multi-source Log Fusion Analysis

Malicious User sentence examples within malicious user detection



Analyzing Online Location-Based Social Networks for Malicious User Detection


Ethereum Analysis via Node Clustering

Malicious User sentence examples within malicious user attack



Enhancing the Robustness of Neural Collaborative Filtering Systems Under Malicious Attacks


Real-Time Network Data Capturing Using Attack Generators and Data Processing Method


Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices



iperfTZ: Understanding Network Bottlenecks for TrustZone-based Trusted Applications



An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks



Forensik Investigation Framework For MongoDB Deployment Type Replica Set



A similarity algorithm based on hamming distance used to detect malicious users in cooperative spectrum sensing



MCP: A Security Testing Tool Driven by Requirements



Multi-attribute identity resolution for online social network



A Novel Authentication Scheme Against Node Captured Attack in WSN for Healthcare Scene



Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks



An improved attribute‐based encryption technique towards the data security in cloud computing



FdGars: Fraudster Detection via Graph Convolutional Networks in Online App Review System



BlackWatch: Increasing Attack Awareness Within Web Applications



Detecting Intrusion with High Accuracy: Using Hybrid K-Multi Layer Perceptron



An Efficient Uplink Scheduler for WiMAX Communication System with Prevention from Security Attacks



Detecting spammers on social network through clustering technique



Poster: Video Chat Scam Detection Leveraging Screen Light Reflection



Detecting Pilot Spoofing Attack in MISO Systems With Trusted User



A trust management scheme for IoT-enabled environmental health/accessibility monitoring services



Robust Watermarking of Neural Network with Exponential Weighting


More Malicious User 악의적인 사용자 sentence examples
10.1109/SoutheastCon42311.2019.9020433

A Testbed for the Evaluation of Denial of Service Attacks in Software-Defined Networks



Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud Environment



Router-based IoT Security using Raspberry Pi



Hierarchical authority based weighted attribute encryption scheme



Privacy-Preserving Similar Patient Queries for Combined Biomedical Data



An Efficient Spatial Temporal Provenance Mechanism for Adhoc Mobile Users



Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System



CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing



An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks



Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies



Secure and flexible economic data sharing protocol based on ID-based dynamic exclusive broadcast encryption in economic system



Data Validation and Correction for Resiliency in Mobile Cyber-Physical Systems



Rumor Spreading from Social Networks to E-commerce



PROLEMus: A Proactive Learning-Based MAC Protocol Against PUEA and SSDF Attacks in Energy Constrained Cognitive Radio Networks



Malicious User Detection in Cooperative Sensing Environment Using Robust Distance



Dynamic Double Threshold Spectrum Sensing Algorithm Based on Block Chain



Physical-layer information hiding technique for cognitive radio communications in cooperative relaying systems



XDoser, A Benchmarking Tool for System Load Measurement Using Denial of Service Features


More Malicious User 악의적인 사용자 sentence examples
10.1109/TrustCom/BigDataSE.2019.00038

Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing



MetaCom: Profiling Meta Data to Detect Compromised Accounts in Online Social Networks



Reputation Evaluation with Malicious Feedback Prevention Using a HITS-Based Model



A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms



B-Ride: Ride Sharing with Privacy-preservation, Trust and Fair Payment atop Public Blockchain



DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions


More Malicious User 악의적인 사용자 sentence examples
10.1109/HPCC/SmartCity/DSS.2019.00043

A Bayesian Improved Defense Model for Deceptive Attack in Honeypot-Enabled Networks



Overview of SDN with Blockchain over Cloud Environment



Spectrum Sensing in Cognitive Radio Networks Under Security Threats and Hybrid Spectrum Access



Detection of Spyware in Software Using Virtual Environment


Learn more from Malicious User 악의적인 사용자

Malicious User 악의적인 사용자


Malicious User 악의적인 사용자
Encyclopedia 백과사전