Search
Now showing items 1-10 of 25
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network ...
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the vast increase in data transmission due to a large number of information collected by devices, data management, and security has been a challenge for organizations. Many data owners (DOs) outsource their data to ...
Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Wireless body area networks (WBANs) are often used to provide communication services for the data from the body. Since the data in WBANs are always closely related to individuals, they need to be kept secret with integrity. ...
LAMANCO: A lightweight anonymous mutual authentication scheme for n -times computing offloading in IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Nowadays in many application scenarios of Internet of Things (IoT), low latency is achieved at the cost of computing-complexity which is beyond the capabilities of IoT devices. Offloading the computing intensive tasks to ...
Security and privacy preservation in fog-based crowd sensing on the internet of vehicles
(
Academic Press
, 2019 , Article)
The emergence of fog computing enables fog-based vehicle crowd sensing (FBVC) to be utilized in various fields. However, existing privacy issues represent a primary challenge that limits the degree of participation by ...
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Conducting reputation management is very important for Internet of vehicles. However, most of the existing work evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation, which cannot ...
A self-selective correlation ship tracking method for smart ocean systems
(
MDPI AG
, 2019 , Article)
In recent years, with the development of the marine industry, the ship navigation environment has become more complicated. Some artificial intelligence technologies, such as computer vision, can recognize, track and count ...
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
As a result of continuous cost reduction and device miniaturization, small UAVs are now more easily accessible to the public. Consequently, numerous new applications in the civilian and commercial domains have emerged. ...
When energy trading meets blockchain in electrical power system: The state of the art
(
MDPI AG
, 2019 , Article)
With the rapid growth of renewable energy resources, energy trading has been shifting from the centralized manner to distributed manner. Blockchain, as a distributed public ledger technology, has been widely adopted in the ...
Adversarial samples on android malware detection systems for IoT systems
(
MDPI AG
, 2019 , Article)
Many IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has ...