Search
Now showing items 31-40 of 97
Breaking HK17 in Practice
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In November 2017, Hecht and Kamlofsky submitted HK17, a quaternion(octonion)-based Diffie-Hellman key exchange protocol, to NIST post-quantum cryptography project, and thought that at least O(p8) arithmetic operations are ...
Arrhythmia classification using DWT-coefficient energy ratios
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Certain features present in electrocardiogram (ECG) signals are used to detect different heart conditions. Hence, by developing a system to extract these features, useful information related to the heart conditions could ...
Towards a Holistic Approach of Cybersecurity
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
This paper aims at proposing an original curriculum of sandwich training in cybersecurity in France responding to the context of the European shuffle on cybersecurity enforcement. Indeed, May of this year sets the milestone ...
Innovative Education in Cyber Security Field Through Collaborative Education
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
This paper proposes an innovative education model as a new curriculum framework. Due of multiplicity of variables we adopted an interdisciplinary dialogue with academic expert and professional from various companies ...
Fuzzy data to crisp estimates: Helping the neurosurgeon making better treatment choices for stroke patients
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Ischemic stroke of brain manifests itself in the form of loss of blood flow at certain parts of the brain rendering them deprived of oxygen, resulting in a chemical imbalance and death of brain cells in that region. The ...
Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild
(
Association for Computing Machinery
, 2019 , Conference Paper)
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in consumer and critical infrastructure realms. Several challenges impede addressing IoT security at large, including, the lack of IoT-centric ...
A novel architecture for tamper proof electronic health record management system using blockchain wrapper
(
Association for Computing Machinery, Inc
, 2019 , Conference Paper)
In this paper, we present a novel architecture of blockchain-based tamper-proof electronic health record (EHR) management system. Recording electronic health data in cloud-based storage systems always pose a threat to ...
A secure and efficient renewable energy trading scheme based on blockchain in smart grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Nowadays, with the diversification and decentralization of energy systems, the energy Internet makes it possible to interconnect distributed energy sources and consumers. In the energy trading market, the traditional ...
Audio based drone detection and identification using deep learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In recent years, unmanned aerial vehicles (UAVs) have become increasingly accessible to the public due to their high availability with affordable prices while being equipped with better technology. However, this raises a ...
Novel hybrid physical layer security technique in RFID systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we propose a novel PHY layer security technique in radio frequency identification (RFID) backscatter communications system. In order to protect the RFID tag information confidentiality from the eavesdroppers ...