Search
Search Results
-
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm
A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...
-
Physiologic Changes with an Exposure to a New Concept Conducted Electrical Weapon (T10™) in Human Volunteers
Axon Enterprise, Inc. has developed a new concept Conducted Electrical Weapon (CEW), the T10. Instead of the traditional high-voltage, electrically...
-
Errorless robust JPEG steganography using steganographic polar codes
Recently, a robust steganographic algorithm that achieves errorless robustness against JPEG recompression has been proposed. The method employs a...
-
Mining digital identity insights: patent analysis using NLP
The field of digital identity innovation has grown significantly over the last 30 years, with over 6000 technology patents registered worldwide....
-
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection
The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to...
-
Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00146-z.
-
Retraction Note: RFID tag recognition model for Internet of Things for training room management
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00154-7
-
Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00144-1.
-
Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00151-w.
-
Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00153-8.
-
Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00150-3.
-
Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00149-w.
-
Retraction Note: IoT devices and data availability optimization by ANN and KNN
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00145-0.
-
Retraction Note: Network security threat detection technology based on EPSO-BP algorithm
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00152-9
-
Machine learning security and privacy: a review of threats and countermeasures
Machine learning has become prevalent in transforming diverse aspects of our daily lives through intelligent digital solutions. Advanced disease...
-
Intelligent multi-agent model for energy-efficient communication in wireless sensor networks
The research addresses energy consumption, latency, and network reliability challenges in wireless sensor network communication, especially in...
-
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system
Over the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet....
-
Develo** Rib Bone Surrogates for High Dynamic Impact Assessment with Additive Manufacturing and Post-mortem Human Subjects (PMHS)-Based Evaluation
The conception of ballistic personal protective equipment requires a comprehensive understanding of the human body’s response to dynamic loads. The...
-
Effectiveness of a New-Generation CEW in Human Subjects with a Goal-Directed Task
Conducted electrical weapons (CEWs) have been used by law enforcement agencies worldwide to control and restrain potentially violent persons. As new...
-
Cancelable templates for secure face verification based on deep learning and random projections
Recently, biometric recognition has become a significant field of research. The concept of cancelable biometrics (CB) has been introduced to address...