Blerim Rexha
Orcid: 0000-0002-3428-7666
According to our database1,
Blerim Rexha
authored at least 16 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CyberNFTs: Conceptualizing a decentralized and reward-driven intrusion detection system with ML.
CoRR, 2024
NoPhish: Efficient Chrome Extension for Phishing Detection Using Machine Learning Techniques.
CoRR, 2024
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints.
CoRR, 2024
2023
Inf. Secur. J. A Glob. Perspect., November, 2023
Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History.
Comput., April, 2023
Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms.
Int. J. Online Biomed. Eng., 2023
CyberNFTs: conceptualising a decentralised and reward-driven intrusion detection system with ML.
Int. J. Inf. Comput. Secur., 2023
2021
Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology.
Int. J. Inf. Comput. Secur., 2021
Trust establishment between OAuth 2.0 resource servers using claims-based authorisation.
Electron. Gov. an Int. J., 2021
Attack Analysis of Face Recognition Authentication Systems Using Fast Gradient Sign Method.
Appl. Artif. Intell., 2021
2019
Applying efficient crowdsourcing techniques for increasing quality and transparency of election processes.
Electron. Gov. an Int. J., 2019
2018
Analysis of Macro-Fem to Cellular Performance in LTE Under Various Transmission Power and Scheduling Schemes.
J. Commun., 2018
Int. J. Recent Contributions Eng. Sci. IT, 2018
Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks.
Future Internet, 2018
2012
Assessment of success factors of e-government project implementation: challenges for the Kosovo e-government perspective.
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, 2012
2005
Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and Smartcards.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005