By: B. Gupta Web Application Security: Exploitation and Countermeasures for Modern Web ApplicationsAndrew HoffmanO’Reilly Web Application…
Category: Research
Research Related Datasets
By: A. Mishra CSE-CIC-IDS2018-AWS CICIDS2017 CIC DoS dataset(2016) DDoS DDoS Botnet attacks from IOT devices Breast…
10 Most Popular Books for Smart-Card Security Research
By: A. Almomani Smart Card Developer’s Kit. Guthery, S. B., & Jurgensen, T., 1998 Alpel Publishing Smart…
10 Popular Journals in Cyber Security
By: D. Peraković IEEE Transactions on Dependable and Secure Computing IEEE IEEE Transactions on Information Forensics…
CONSUMER DATA PROTECTION IN CLOUD AND IOT NETWORKS
By: Praneeth Internet of Things (IoT) incorporates several resources into systems that deliver complex and smart…
Top 10 Journals/Conferences in the Field of Computer Science & Cryptography
By: K. Psannis ACM Symposium on Computer and Communications Security H5- index 94 H5-median 162 IEEE…
Top 10 Researchers in the Field of Machine Learning
By: A. Castiglione Geoffrey Hinton Affiliation: Emeritus Prof. Comp Sci, U.Toronto & Engineering Fellow Citation: 495206…
List of Top 10 ACM Transactions in Computer Science
By: F. J. Penalvo ACM Computing Surveys Web of Science Reviews: 2,383 Total Citation: 195,165 Total…
List of 2020 Web of Science (WoS) Highly Cited Researchers in Computer Science
By: X. Chang This list of 2020 Highly Cited Researchers in Computer Science from Clarivate identifies…
Top 10 Elsevier Journals in Artificial Intelligence
By: Z. Zhou Nowadays, Artificial intelligence (AI) is widely used in various application domains and is…
Top 10 IEEE Transactions in Computer Science
By: Z. Zhou This list shows the top 10 IEEE Transactions/Journals/magazines in Computer Science based on…