بحث بسيط
السجلات المعروضة 1 -- 10 من 13
Cybersecurity for industrial control systems: A survey
(
Elsevier Ltd
, 2020 , Article Review)
Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic ...
Hierarchical security paradigm for iot multiaccess edge computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The rise in embedded and IoT device usage comes with an increase in LTE usage as well. About 70% of an estimated 18 billion IoT devices will be using cellular LTE networks for efficient connections. This introduces several ...
DistPrivacy: Privacy-Aware Distributed Deep Neural Networks in IoT surveillance systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the emergence of smart cities, Internet of Things (IoT) devices as well as deep learning technologies have witnessed an increasing adoption. To support the requirements of such paradigm in terms of memory and computation, ...
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are still more dependent on smart systems. Considering that packets are exchanged between the end user and the ...
Iterative per Group Feature Selection for Intrusion Detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained ...
Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ...
Weighted Trustworthiness for ML Based Attacks Classification
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Recently, machine learning techniques are gaining a lot of interest in security applications as they exhibit fast processing with real-time predictions. One of the significant challenges in the implementation of these ...
Hierarchical Federated Learning for Collaborative IDS in IoT Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
As the Internet-of-Things devices are being very widely adopted in all fields, such as smart houses, healthcare, and transportation, extremely huge amounts of data are being gathered, shared, and processed. This fact raises ...
Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems
(
Elsevier B.V.
, 2021 , Article)
Emerging technological innovation toward e-Health transition is a worldwide priority for ensuring people's quality of life. Hence, secure exchange and analysis of medical data amongst diverse organizations would increase ...
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...