Search
Now showing items 31-40 of 43
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Article)
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ...
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
(
Elsevier B.V.
, 2021 , Article)
Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ...
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
(
Elsevier Ltd
, 2022 , Article)
Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ...
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
(
Hindawi Limited
, 2022 , Article)
Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ...
Policy specification and verification for blockchain and smart contracts in 5G networks
(
Korean Institute of Communications Information Sciences
, 2020 , Article)
Blockchain offers unprecedented opportunities for innovation in financial transactions. A whole new world of opportunities for banking, lending, insurance, money transfer, investments, and stock markets awaits. However, ...
Minimizing energy consumption of IoT devices for O-RAN based IoT systems
(
Elsevier
, 2023 , Article)
The implementation of Open Radio Access Network (O-RAN) architecture in Internet of Things (IoT) systems has garnered significant attention as a means to fulfill the stringent requirements of ultra-low latency and ultra-low ...
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
(
Elsevier B.V.
, 2022 , Article)
6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ...
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ...
Secure Vehicular Platoon Management against Sybil Attacks
(
MDPI
, 2022 , Article)
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ...
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the ...