Search
Now showing items 1-6 of 6
Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild
(
Association for Computing Machinery
, 2019 , Conference Paper)
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in consumer and critical infrastructure realms. Several challenges impede addressing IoT security at large, including, the lack of IoT-centric ...
A cost-aware model for risk mitigation in Cloud computing systems
(
IEEE Computer Society
, 2016 , Conference Paper)
Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we are mainly concerned with formulation and computation of security indices for linear cyber-physical systems (CPS), where both input and output channels are subjected to malicious cyber attacks. The ...
Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Implantable Medical Devices (IMDs) are a growing industry regarding personal health care and monitoring. In addition, they provide patients with efficient treatments. In general, these devices use wireless communication ...
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ...
An autonomic detection and protection system for denial of service attack
(
ACTA Press
, 2012 , Conference Paper)
This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ...