Malicious URL detection is an emerging research area due to the continuous modernization of various systems, for instance, Edge Computing. This article presents a novel malicious …
Today is the era of smart devices. Through smart devices, people remain connected with each other across the globe. But, it led the current Internet towards scalability issues …
S Nayak, R Patgiri - 2021 17th International Conference on …, 2021 - ieeexplore.ieee.org
Bloom Filter is a probabilistic data structure for the membership query, and it has been intensely experimented in various fields to reduce memory consumption and enhance a …
N Lu, M Liu, W Shi, X Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud auditing allows users to leverage digital signature evidences to undertake remote data verification and consequently determine the integrity of their data stored in the cloud …
A Bloom filter is a probabilistic data structure for approximate membership filtering. It is applied in diverse Network systems to enhance a system's performance and reduce the …
R Patgiri - 2019 IEEE 21st International Conference on High …, 2019 - ieeexplore.ieee.org
Bloom Filter is a data structure for membership filter that deployed in diverse domains. Bloom Filter is able to reduce on-chip memory consumption on an order of magnitude …
R Bhat, RK Thilak, RP Vaibhav - International Journal of Information …, 2022 - Springer
There has been rapid growth in the field of graphical processing unit (GPU) programming due to the drastic increase in the computing hardware manufacturing. The technology used …
Electronic health records contain the patient's sensitive information. If these data are acquired by a malicious user, it will not only cause the pilferage of the patient's personal …
W Lian, Y Li, J Wang, J You - Electronics, 2022 - mdpi.com
Information-centric networking (ICN) is a new network architecture that routes content based on names to improve transmission performance. Therefore, the efficiency of name resolution …