Přeskočit na horní lištu
Přeskočit na hlavičku
Přeskočit na obsah
Přeskočit na patičku
EN
>
Publikace
>
Vyhledávání publikací
Vyhledávání publikací
Pokročilé vyhledávání
Repozitář
Vybrané publikace/výsledky
Binary Sketches for Secondary Filtering (2019)
Detecting Masquerading Traitors from Process Visualization of Computer (2023)
SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems (2019)
Metric Embedding into the Hamming Space with the n-Simplex Projection (2019)
MBS: Multilevel Blockchain System for IoT (2021)
Enhanced Network Intrusion Detection System Protocol for Internet of Things (2020)
An Efficient Mutual Authentication Scheme for Internet of Things (2020)
An Enhanced Blockchain-Based Data Management Scheme for Microgrids (2020)
Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme (2020)
Blockchain-based Access Control for IoT in Smart Home Systems (2020)
On the Application of Convex Transforms to Metric Search (2020)
Empowering Communications in Vehicular Networkswith an Intelligent Blockchain-Based Solution (2020)
Accelerating Metric Filtering by Improving Bounds on Estimated Distances (2020)
Pivot Selection for Narrow Sketches by Optimization Algorithms (2020)
Binary Sketches for Secondary Filtering (2020)
Trust-based Authentication for Smart Home Systems (2021)
ANALYZA – Výpočetní a orchestrační subsystém (2020)
Trust-based Detection Strategy against Replication Attacks in IoT (2021)
On the Similarity Search With Hamming Space Sketches (2021)
Using Process Mining for Git Log Analysis of Projects in a Software Development Course (2021)
Identification of Unintentional Perpetrator Attack Vectors using Simulation Game: A Case Study (2021)
Proactive Trust Classification for Detection of Replication Attacks in 6LoWPAN-based IoT (2021)
A Secure and Efficient Blockchain Scheme for the Internet of Bikes (2022)
Game Achievement Analysis: Process Mining Approach (2022)
Cybersecurity Analysis via Process Mining: A Systematic Literature Review (2022)
Similarity Search for an Extreme Application: Experience and Implementation (2021)
A Real time Healthcare Tracking System based on Blockchain Application (2021)
Implementace komunikačních rozhraní v monitorovacích systémech přenosových soustav (2021)
Process Mining Usage in Cybersecurity and Software Reliability Analysis: A Systematic Literature Review (2022)
An Intelligent Blockchain application for Emergency Medical Services (2022)
An Adaptive Anti-jamming System in HyperLedger-based Wireless Sensor Networks (2022)
Blockchain-based Real Time Healthcare Emergency (2022)
Evaluating Code Improvements in Software Quality Course Projects (2022)
Data-dependent Metric Filtering (2022)
Nearest-neighbor Search from Large Datasets using Narrow Sketches (2022)
Process Mining Analysis of Puzzle-Based Cybersecurity Training (2022)
Applying Process Discovery to Cybersecurity Training: An Experience Report (2022)
Software pro generování datového provozu pro monitorovací a řídicí systémy TSO na protokolech ICCP-TASE.2 a IEC 60870-5-101 (2021)
Scenarios for Process-Aware Insider Attack Detection in Manufacturing (2022)
Precisional Detection Strategy for 6LoWPAN Networks in IoT (2022)
Similarity Search with the Distance Density Model (2022)
Concept of Relational Similarity Search (2022)
A Survey of Intrusion Detection-based Trust Management Approaches in IoT Networks (2023)
Addressing insider attacks via forensic-ready risk management (2023)
Legislativní a technická analýza vývoje energetiky a řízení zátěže v prostředí moderní energetiky TK04020195-V2 (2022)
CopAS: A Big Data Forensic Analytics System (2023)
An Effective Replica Node Detection Scheme in Internet of Things Networks (2023)
Gamification tailored for novelty effect in distance learning during COVID-19 (2023)
CRANBERRY: Memory-Effective Search in 100M High-Dimensional CLIP Vectors (2023)
Selected Software and Tools for Smart Grid Simulation in Research (2023)
Using data clustering to reveal trainees’ behavior in cybersecurity education (2024)
Analýza možností využití dat ze smart meterů pro řízení a nutné podmínky pro jejich využití včetně uvažování blockchainu TK04020195-V8 (2023)
Self-adaptive RFID Authentication for Internet of Things (2020)
Odebrat vše z výběru
Operace s vybranými výsledky
Export a tisk
Seznam vybraných záznamů
Další aplikace
Publikace
Informační systém