Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey Authors: Rabia Nasir, Humaira Ashraf, NZ Jhanjhi | Published: 2023-12-20 Clustering methodsProtocol Performance EvaluationTrust Evaluation 2023.12.20 2025.05.27 Literature Database
Improved Flow Recovery from Packet Data Authors: Anthony Kenyon, David Elizondo, Lipika Deka | Published: 2023-10-15 Data Management SystemFlow InconsistencyProtocol Performance Evaluation 2023.10.15 2025.05.28 Literature Database
Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07 Protocol Performance EvaluationMalware Detection MethodFeature Extraction Method 2023.04.07 2025.05.28 Literature Database
Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors Authors: Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near | Published: 2021-12-13 Privacy ViolationProtocol Performance EvaluationCommunication Efficiency 2021.12.13 2025.05.28 Literature Database