Search
Now showing items 11-20 of 48
Skyline Discovery and Composition of Multi-Cloud Mashup Services
(
Institute of Electrical and Electronics Engineers
, 2016 , Article)
A cloud mashup is composed of multiple services with shared datasets and integrated functionalities. For example, the elastic compute cloud (EC2) provided by Amazon Web Service (AWS), the authentication and authorization ...
Deep learning for detection of routing attacks in the internet of things
(
Atlantis Press
, 2018 , Article)
Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ...
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
Systematic identification of threats in the cloud: A Survey
(
Elsevier B.V.
, 2019 , Article)
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
(
Elsevier Ltd
, 2018 , Article)
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ...
Enabling broadcast communications in presence of jamming via probabilistic pairing
(
Elsevier B.V.
, 2017 , Article)
This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
PriviPK: Certificate-less and secure email communication
(
Elsevier Ltd
, 2017 , Article)
We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ...
Real-time cooperative data routing and scheduling in software defined vehicular networks
(
Elsevier B.V.
, 2022 , Article)
Links in vehicular networks are highly dynamic and generally exist only for a limited amount of time. Moreover, data packets are generally transmitted over multiple hops and have diverse latency requirements. The above ...
Compressive sensing based electronic nose platform
(
Elsevier
, 2017 , Article)
Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...
Significant wave height forecasting using hybrid ensemble deep randomized networks with neurons pruning
(
Elsevier Ltd
, 2023 , Article)
The reliable control of wave energy devices highly relies on the forecasts of wave heights. However, the dynamic characteristics and significant fluctuation of waves’ historical data pose challenges to precise predictions. ...