Search
Now showing items 51-60 of 60
Smart Grid Cybersecurity: Standards and Technical Countermeasures
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...
Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
This paper talks about the process of developing a game called 'Virtual Reality Falconry'. The game is a simulation of the traditional Qatari hunting sport. Falconry refers to the process of hunting wild preys in their ...
Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ...
A formal model-based testing framework for validating an IoT solution for blockchain-based vehicles communication
(
SciTePress
, 2020 , Conference Paper)
The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every "thing" to the Internet and in particular in transportation through the Internet ...
Applying zero trust security principles to defence mechanisms against data exfiltration attacks
(
wiley
, 2021 , Book chapter)
The zero-trust principle explicitly verifies that the authentication and authorization of all actions are performed regardless of the requesting user's credentials or permissions. This chapter presents the details of a ...
A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
(
Mary Ann Liebert Inc.
, 2021 , Article)
The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization ...
Vulnerabilities and countermeasures in electrical substations
(
Elsevier
, 2021 , Article)
The impending and continued threat of cyberattacks on modern utility grids has called for action from the different stakeholders of the electricity sector. This calls for a thorough investigation and review of the weaknesses ...