Blerim Rexha

Orcid: 0000-0002-3428-7666

According to our database1, Blerim Rexha authored at least 16 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CyberNFTs: Conceptualizing a decentralized and reward-driven intrusion detection system with ML.
CoRR, 2024

NoPhish: Efficient Chrome Extension for Phishing Detection Using Machine Learning Techniques.
CoRR, 2024

Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints.
CoRR, 2024

2023
Transactions privacy on blockchain using web of trust concept.
Inf. Secur. J. A Glob. Perspect., November, 2023

Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History.
Comput., April, 2023

Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms.
Int. J. Online Biomed. Eng., 2023

CyberNFTs: conceptualising a decentralised and reward-driven intrusion detection system with ML.
Int. J. Inf. Comput. Secur., 2023

2021
Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology.
Int. J. Inf. Comput. Secur., 2021

Trust establishment between OAuth 2.0 resource servers using claims-based authorisation.
Electron. Gov. an Int. J., 2021

Attack Analysis of Face Recognition Authentication Systems Using Fast Gradient Sign Method.
Appl. Artif. Intell., 2021

2019
Applying efficient crowdsourcing techniques for increasing quality and transparency of election processes.
Electron. Gov. an Int. J., 2019

2018
Analysis of Macro-Fem to Cellular Performance in LTE Under Various Transmission Power and Scheduling Schemes.
J. Commun., 2018

Using Efficient TRNGs for PSEUDO Profile in National eID Card.
Int. J. Recent Contributions Eng. Sci. IT, 2018

Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks.
Future Internet, 2018

2012
Assessment of success factors of e-government project implementation: challenges for the Kosovo e-government perspective.
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, 2012

2005
Increasing User Privacy in Online Transactions with X.509 v3 Certificate Private Extensions and Smartcards.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005


  Loading...