بحث بسيط
السجلات المعروضة 1 -- 10 من 14
A Collaboration Incentive Exploiting the Primary-Secondary Systems' Cross Interference for PHY Security Enhancement
(
IEEE
, 2016 , Article)
We investigate the spectrum sharing possibility as an incentive to enhance the physical layer security. The concept behind is that a legitimate source-destination pair, communicating in the presence of a passive eavesdropper, ...
Secure UAV communication networks over 5G
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Wireless communications can leverage UAVs to provide ubiquitous connectivity to different device types. Recently, integrating UAVs into a macro cell network is drawing unprecedented interest for supplementing terrestrial ...
Changing Dynamics of network security involving hacking/cracking with next generation firewalls (NGFW)
(
IGI Global
, 2016 , Book chapter)
With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day. For every user connected to network, security attacks like hacking and cracking are very ...
Network Coding versus Replication Based Resilient Techniques to Mitigate Insider Attacks for Smart Metering
(
SAGE publications
, 2015 , Article)
The main focus of this paper is the resilience of communication protocols for data gathering in distributed, large scale, and dense networks. In our previous work, we have proposed the resilient methods based on random ...
Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild
(
Association for Computing Machinery
, 2019 , Conference Paper)
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in consumer and critical infrastructure realms. Several challenges impede addressing IoT security at large, including, the lack of IoT-centric ...
SCADA system testbed for cybersecurity research using machine learning approach
(
MDPI AG
, 2018 , Article)
This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in ...
A cost-aware model for risk mitigation in Cloud computing systems
(
IEEE Computer Society
, 2016 , Conference Paper)
Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we are mainly concerned with formulation and computation of security indices for linear cyber-physical systems (CPS), where both input and output channels are subjected to malicious cyber attacks. The ...
Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Implantable Medical Devices (IMDs) are a growing industry regarding personal health care and monitoring. In addition, they provide patients with efficient treatments. In general, these devices use wireless communication ...
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ...