Search
Now showing items 41-50 of 59
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
(
IEEE Computer Society
, 2021 , Article)
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
TamForen: A tamper-proof cloud forensic framework
(
John Wiley and Sons Inc
, 2022 , Article)
Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive ...
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ...
Optimal Cooperative Relaying and Power Control for IoUT Networks with Reinforcement Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Internet of Underwater Things (IoUT) consists of numerous sensor nodes distributed in an underwater area for sensing, collecting, processing information, and sending related messages to the data processing center. However, ...
An adaptive cache management approach in ICN with pre-filter queues
(
Elsevier B.V.
, 2020 , Article)
In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ...
Fault diagnosis based on deep learning for current-carrying ring of catenary system in sustainable railway transportation
(
Elsevier Ltd
, 2021 , Article)
In the intelligent traffic transportation, the security and stability are vital for the sustainable transportation and efficient logistics. The fault diagnosis on the catenary system is crucial for the railway transportation. ...
A Blockchain-Based Storage System with Financial Incentives for Load-balancing
(
IEEE Computer Society
, 2021 , Article)
Most storage systems adopt distributed architecture to reach high reliability. In these distributed systems, a well-balanced data distribution can improve storage reliability. However, existing schemes rely on dealers to ...
Blockchain-Based Anonymous Authentication with Selective Revocation for Smart Industrial Applications
(
IEEE Computer Society
, 2020 , Article)
Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential ...
A sentence-level text adversarial attack algorithm against IIoT based smart grid
(
Elsevier B.V.
, 2021 , Article)
With the development of data processing technologies, efficiency of information processing in the Industrial Internet of Things (IIoT) is greatly improved. In this situation solving the following security problems of the ...
Profit Maximization of Online Service Function Chain Orchestration in an Inter-Datacenter Elastic Optical Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
To meet the increasing traffic demands characterized by large bandwidth and high burstiness, more traffic has been moving to inter-datacenter elastic optical networks (inter-DC EONs) for processing. The integration of two ...