Search
Now showing items 21-30 of 31
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ...
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
(
Elsevier B.V.
, 2020 , Article)
Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ...
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Proportionally fair approach for tor's circuits scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...
VisDrone-CC2020: The Vision Meets Drone Crowd Counting Challenge Results
(
Springer Science and Business Media Deutschland GmbH
, 2020 , Conference Paper)
Crowd counting on the drone platform is an interesting topic in computer vision, which brings new challenges such as small object inference, background clutter and wide viewpoint. However, there are few algorithms focusing ...
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a ...
Multi-layer security scheme for implantable medical devices
(
Springer
, 2020 , Article)
Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. ...
FacebookVideoLive18: A Live Video Streaming Dataset for Streams Metadata and Online Viewers Locations
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the advancement in personal smart devices and pervasive network connectivity, users are no longer passive content consumers, but also contributors in producing new contents. This expansion in live services requires a ...
Prevention of barite sag in water-based drilling fluids by a urea-based additive for drilling deep formations
(
MDPI
, 2020 , Article)
Barite sag is a challenging phenomenon encountered in deep drilling with barite-weighted fluids and associated with fluid stability. It can take place in vertical and directional wells, whether in dynamic or static conditions. ...