Search
Now showing items 21-27 of 27
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...
A Modified Layer of Protection Analysis for Cyber-Physical Systems Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Layer of Protection Analysis (LOPA) is the most commonly used approach for quantitative safety risk assessment in the process control industry to protect a Cyber- Physical System (CPS) from accidental hazards-causing ...
DTW based Authentication for Wireless Medical Device Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Wireless medical devices play an important role in providing safety and privacy to patients suffering from major health issues. These light-weight devices can be worn inside or outside the patient's body and provide more ...
Managing Security Control Assumptions Using Causal Traceability
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
Performance evaluation of TCP and UDP traffic in IEEE 1451 compliant healthcare infrastructure
(
Springer Nature
, 2012 , Conference Paper)
Wireless ad-hoc and intrastructure networks have become very popular during the last ten years. Due to this reason, wireless security has become a very serious issue, specially in healthcare intrastructure networks. The ...
Mobile Commerce Adoption From Consumers Perspective: The Case of Jordan
(
IGI Global
, 2018 , Article)
In response, to little research focused on how Jordanians perceive and respond to m-commerce and the main factors that govern its adoption and use, this article proposes a conceptual model that extends the technology ...