بحث بسيط
السجلات المعروضة 11 -- 20 من 21
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
(
Elsevier Ltd
, 2018 , Article)
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ...
Enabling broadcast communications in presence of jamming via probabilistic pairing
(
Elsevier B.V.
, 2017 , Article)
This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
Compressive sensing based electronic nose platform
(
Elsevier
, 2017 , Article)
Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...
An iterative cyclic tri-strategy hybrid stochastic fractal with adaptive differential algorithm for global numerical optimization
(
Elsevier Inc.
, 2023 , Article)
Many real-life problems can be formulated as numerical optimization problems. Such problems pose a challenge for researchers when designing efficient techniques that are capable of finding the desired solution without ...
Inpatient Discharges Forecasting for Singapore Hospitals by Machine Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Hospitals can predetermine the admission rate and facilitate resource allocation based on valid emergency requests and bed capacity estimation. The excess unoccupied beds can be determined with the help of forecasting the ...
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things
(
Elsevier
, 2021 , Article)
Big data enables the optimization of complex supply chains through Machine Learning (ML)-based data analytics. However, data analytics comes with challenges such as the loss of control and privacy leading to increased risk ...
A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
(
Mary Ann Liebert Inc.
, 2021 , Article)
The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization ...
Vulnerabilities and countermeasures in electrical substations
(
Elsevier
, 2021 , Article)
The impending and continued threat of cyberattacks on modern utility grids has called for action from the different stakeholders of the electricity sector. This calls for a thorough investigation and review of the weaknesses ...