skip to main content
Show Results with:

Results 1 - 10 of 669  for Everything in this catalogue

results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Material Type:
Article
Add to My workspace

Physical Layer Security for RF Satellite Channels in the Finite-Length Regime

Hayashi, Masahito

IEEE transactions on information forensics and security. Volume 14:Number 4 (2018, October 31st); pp 981-993 -- IEEE Signal Processing Society

Online access

2
Material Type:
Article
Add to My workspace

Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses

Rui Zhao,; Chuan Yue,; Qi Han,

IEEE transactions on information forensics and security. Volume 14:Number 1 (2018, July 12th); pp 75-89 -- IEEE Signal Processing Society

Online access

3
Material Type:
Article
Add to My workspace

ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid

Xiaofang Xia,; Yang Xiao,; Wei Liang,

IEEE transactions on information forensics and security. Volume 14:Number 2 (2018, August 7th); pp 445-458 -- IEEE Signal Processing Society

Online access

4
Material Type:
Article
Add to My workspace

Hardware-Assisted Transparent Tracing and Debugging on ARM

Zhenyu Ning,; Fengwei Zhang,

IEEE transactions on information forensics and security. Volume 14:Number 6 (2019, March 7th); pp 1595-1609 -- IEEE Signal Processing Society

Online access

5
Material Type:
Article
Add to My workspace

Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT

Yaxing Chen, et al.

IEEE transactions on information forensics and security. Volume 14:Number 7 (2019, April 8th); pp 1830-1842 -- IEEE Signal Processing Society

Online access

6
Material Type:
Article
Add to My workspace

PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing

Yuan, Dong et al.

IEEE transactions on information forensics and security. Volume 15: (2019, September 17th); pp 299-314 -- IEEE Signal Processing Society

Online access

7
Material Type:
Article
Add to My workspace

ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications

Fan, Chun-I

IEEE transactions on information forensics and security. Volume 15: (2019, October 9th); pp 927-942 -- IEEE Signal Processing Society

Online access

8
Material Type:
Article
Add to My workspace

A Multimodal Deep Learning Method for Android Malware Detection Using Various Features

TaeGuen Kim, et al.

IEEE transactions on information forensics and security. Volume 14:Number 3 (2018, September 13th); pp 773-788 -- IEEE Signal Processing Society

Online access

9
Material Type:
Article
Add to My workspace

IEEE Transactions on Information Forensics and Security publication information

IEEE transactions on information forensics and security. Volume 14:Number 6 (2019, May 21st); pp C2-C2 -- IEEE Signal Processing Society

Online access

10
Material Type:
Article
Add to My workspace

Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks

Li, Quanzhong

IEEE transactions on information forensics and security. Volume 15:Number 1 (2019, September 11th); pp 130-143 -- IEEE Signal Processing Society

Online access

Results 1 - 10 of 669  for Everything in this catalogue

results 1 2 3 4 5 next page

Refine Search Results

Refine my results

Access Options 

  1. Request to Reading Room  (668)
  2. Online: Reading Room only  (1)
  3. Online  (1)
  4. Refine further open sub menu

Material type 

  1. Articles  (668)
  2. Journals  (1)
  3. Refine further open sub menu

Subject 

  1. Signal processing--Periodicals  (668)
  2. Réseaux d'ordinateurs--Sécurité--Mesures--Périodiques  (668)
  3. Computer networks--Security measures--Periodicals  (668)
  4. Sécurité informatique--Périodiques  (668)
  5. Scheduling--Downlink--Security--Resource management--Antennas--Wireless communication--Physical layer  (3)
  6. Computer crime--Privacy--Bandwidth--Cloud computing--Protocols--Computer architecture  (3)
  7. Finger vein recognition--soft biometric trait--vein imaging principle--intensity distribution  (3)
  8. Physical layer security--secrecy rate--potential eavesdropper--downlink--opportunistic user scheduling--artificial noise transmission--power allocation  (3)
  9. Transform coding--Distortion--Discrete cosine transforms--Security--Cost function--Computational complexity--Microscopy  (3)
  10. Video anomaly detection--squirrel-cage local binary pattern--motion descriptor  (3)
  11. Trajectory--Rotors--Dynamics--Anomaly detection--Feature extraction--Histograms--Lighting  (3)
  12. Steganography--distortion--JPEG--microscale  (3)
  13. Authentication--Encryption--Throughput--Multicore processing--Receivers--Transmitters  (3)
  14. Arbiter PUF--reliability enhancement--machine learning attack resistance--authentication protocol  (3)
  15. Field programmable gate arrays--Reliability--Authentication--Hardware--Servers--Machine learning--Resistance  (3)
  16. DDoS attacks--privacy-preserving--ISPs--immediate deployability  (3)
  17. Veins--Thumb--Feature extraction--Biomedical imaging--Shape  (3)
  18. RFID--cloned tags--unreconciled collisions--Aloha  (3)
  19. Authentication--encryption--AES-CCM--multicore--asynchronous circuit--key adjusting technique  (3)
  20. Circuits--very large scale integration industrial electronics--testing--circuit testing  (2)
  21. Refine further open sub menu

Creation date 

From To
  1. Before2011  (2)
  2. 2011To2013  (5)
  3. 2014To2015  (25)
  4. 2016To2018  (224)
  5. After 2018  (413)
  6. Refine further open sub menu

Form/Genre 

  1. Article  (668)
  2. Périodiques  (1)
  3. Periodicals  (1)
  4. Refine further open sub menu

Additional Features 

  1. Abstract  (640)
  2. No Abstract  (28)
  3. Refine further open sub menu

Searching Remote Databases, Please Wait