Browsing by Subject "security"
Now showing items 1-20 of 36
-
5G vehicular network resource management for improving radio access through machine learning
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The current cellular technology and vehicular networks cannot satisfy the mighty strides of vehicular network demands. Resource management has become a complex and challenging objective to gain expected outcomes in a ... -
A cost-aware model for risk mitigation in Cloud computing systems
( IEEE Computer Society , 2016 , Conference Paper)Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ... -
A New Shift in Implementing Unmanned Aerial Vehicles (UAVs) in the Safety and Security of Smart Cities: A Systematic Literature Review
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article Review)The rapid rise of Unmanned Aerial Vehicles (UAVs) and their integration into smart city initiatives has sparked a surge of research interest in a broad array of thematic areas. This study undertakes a comprehensive review ... -
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged restorative methodology, are a type of implantable medical device which uses electrical stimulation to treat neurological disorders. These devices ... -
A Novel Efficient Classwise Sparse and Collaborative Representation for Holistic Palmprint Recognition
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Palmprint recognition is an important and widely used modality in biometric systems. It has a high reliability, stability and user acceptability. Although the discriminative ability of the existing state-of-the-art holistic ... -
A Simple Approach for Securing IoT Data Transmitted over Multi-RATs
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In an mHealth remote patient monitoring scenario, usually control units/data aggregators receive data from the body area network (BAN) sensors then send it to the network or 'cloud'. The control unit would have to transmit ... -
Addressing Cloud Computing in Enterprise Architecture: Issues and Challenges
( Cutter Consortium , 2009 , Article)This article discusses how the characteristics of cloud computing affect the enterprise architecture in four domains: business, data, application and technology. The ownership and control of architectural components are ... -
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
( Mary Ann Liebert Inc. , 2021 , Article)The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization ... -
Battery status-aware authentication scheme for V2G networks in smart grid
(2013 , Article)Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ... -
Blockchain Technology for Intelligent Transportation Systems: A Systematic Literature Review
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Other)The use of Blockchain technology has recently become widespread. It has emerged as an essential tool in various academic and industrial fields, such as healthcare, transportation, finance, cybersecurity, and supply chain ... -
Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber-Physical Systems
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Safety risk assessment is an essential process to ensure a dependable cyber-physical system (CPS) design. Traditional risk assessment considers only physical failures. For modern CPSs, failures caused by cyber attacks are ... -
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
( IEEE , 2021 , Article)The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. ... -
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health and itinerary planning. ... -
HoliTrust-A holistic cross-domain trust management mechanism for service-centric internet of things
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes commonly have a low capacity to maintain security on their own expenses, which increases the vulnerability for several attacks. ... -
Impact of the Wireless Network's PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)We investigate the impact of the wireless network's physical layer (PHY) security and reliability on demand-side management operation in the smart grid. We assume that consumers communicate their energy demands with the ... -
The impact of trust, security, and privacy on individual's use of the internet for online shopping and social media: a multi-cultural study
( Inderscience Publishers , 2019 , Article)This paper examines through the lens of expectancy-valence theory the impact of trust, privacy, and security on the decision to use the internet for online shopping and social media. It also investigates the moderating ... -
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ... -
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the ... -
Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Electric vehicles (EVs) have been slowly replacing conventional fuel based vehicles since the last decade. EVs are not only environment-friendly but when used in conjunction with a smart grid, also open up new possibilities ... -
LPPDA: A Light-Weight Privacy-Preserving Data Aggregation Protocol for Smart Grids
( IEEE Explore , 2023 , Article)Smart meters are continuously being deployed in several countries as a step in the direction of modernizing the power grid. Smart meters allow for automatic electricity consumption reporting to energy providers to facilitate ...