Search
Now showing items 31-40 of 43
Secure Vehicular Platoon Management against Sybil Attacks
(
MDPI
, 2022 , Article)
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ...
Minimizing energy consumption of IoT devices for O-RAN based IoT systems
(
Elsevier
, 2023 , Article)
The implementation of Open Radio Access Network (O-RAN) architecture in Internet of Things (IoT) systems has garnered significant attention as a means to fulfill the stringent requirements of ultra-low latency and ultra-low ...
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Article)
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ...
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
(
Elsevier B.V.
, 2022 , Article)
6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ...
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
(
Elsevier Ltd
, 2022 , Article)
With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering ...
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
(
Hindawi Limited
, 2022 , Article)
Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ...
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
(
Elsevier B.V.
, 2021 , Article)
Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ...
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the ...
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks
(
Hindawi Limited
, 2021 , Article)
Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ...