Search
Now showing items 1-5 of 5
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged restorative methodology, are a type of implantable medical device which uses electrical stimulation to treat neurological disorders. These devices ...
Battery status-aware authentication scheme for V2G networks in smart grid
(2013 , Article)
Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ...
Secure and distributed data discovery and dissemination in wireless sensor networks
(
IEEE Computer Society
, 2015 , Article)
A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery ...
HoliTrust-A holistic cross-domain trust management mechanism for service-centric internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes commonly have a low capacity to maintain security on their own expenses, which increases the vulnerability for several attacks. ...