بحث بسيط
السجلات المعروضة 21 -- 30 من 58
Combating jamming attacks in multi-channel IoT networks using game theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ...
A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Internet of Things technology has been used in a wide range of fields, ranging from industrial applications to individual lives. As a result, a massive amount of sensitive data is generated and transmitted by IoT ...
Hierarchical Federated Learning over HetNets enabled by Wireless Energy Transfer
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Training centralized machine learning (ML) models becomes infeasible in wireless networks due to the increasing number of internet of things (IoT) and mobile devices and the prevalence of the learning algorithms to adapt ...
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
With the widespread use of Android devices, research on their security has attracted increasing attention. However, at present, digital forensics for investigating attacks, such as social engineering attacks and phishing ...
Intelligent cooperative health emergency response system in autonomous vehicles
(
IEEE Computer Society
, 2021 , Conference Paper)
Recent technological advances have reshaped many aspects of our lives, especially modern transportation systems. For instance, AI and B5G Networks have raised the level of automation as autonomous vehicles (AV) become ...
NOMA-based Joint Allocation and Offloading Strategy of Communication and Computing Resources
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
This paper proposes an offloading strategy for communication resources and computing resources. Based on the communication background of NOMA, this strategy combines D2D communication and cellular mobile communication to ...
Smart stock exchange market: A secure predictive decentralized model
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Stock exchanges around the world are exploring the best possible solution that can improve trading efficiency, lower the risks and tighten secu- rity levels. The working and functioning of a stock exchange involves very ...
A design of firewall based on feedback of intrusion detection system in cloud environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
Cloud database encryption technology based on combinatorial encryption
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...
Outlier detection approaches based on machine learning in the internet-of-things
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Outlier detection in the Internet of Things (IoT) is an essential challenge issue studied in numerous fields, including fraud monitoring, intrusion detection, secure localization, trust management, and so on. Conventional ...