بحث بسيط
السجلات المعروضة 1 -- 10 من 11
Cybersecurity for next generation healthcare in Qatar
(
Hamad bin Khalifa University Press (HBKU Press)
, 2021 , Article)
Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ...
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Internet of Things (IoT) environments are widely employed in industrial applications including intelligent transportation systems, healthcare systems, and building energy management systems. For such environments of highly ...
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things
(
Elsevier
, 2021 , Article)
Big data enables the optimization of complex supply chains through Machine Learning (ML)-based data analytics. However, data analytics comes with challenges such as the loss of control and privacy leading to increased risk ...
A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT ...
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
(
Elsevier B.V.
, 2021 , Article)
Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ...
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
(
Mary Ann Liebert Inc.
, 2021 , Article)
The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization ...
Vulnerabilities and countermeasures in electrical substations
(
Elsevier
, 2021 , Article)
The impending and continued threat of cyberattacks on modern utility grids has called for action from the different stakeholders of the electricity sector. This calls for a thorough investigation and review of the weaknesses ...
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ...