Search
Now showing items 21-30 of 34
Weighted Trustworthiness for ML Based Attacks Classification
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Recently, machine learning techniques are gaining a lot of interest in security applications as they exhibit fast processing with real-time predictions. One of the significant challenges in the implementation of these ...
Hierarchical Federated Learning for Collaborative IDS in IoT Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
As the Internet-of-Things devices are being very widely adopted in all fields, such as smart houses, healthcare, and transportation, extremely huge amounts of data are being gathered, shared, and processed. This fact raises ...
Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems
(
Elsevier B.V.
, 2021 , Article)
Emerging technological innovation toward e-Health transition is a worldwide priority for ensuring people's quality of life. Hence, secure exchange and analysis of medical data amongst diverse organizations would increase ...
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ...
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In order to maintain a satisfactory performance in the midst of rapid growth of mobile traffic, the mobile network infrastructure needs to be scaled. Thus there has been significant interest in scalability of mobile core ...
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Smart and Secure Wireless Communications via Reflecting Intelligent Surfaces: A Short Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the emergence of the Internet of Things (IoT) technology, wireless connectivity should be more ubiquitous than ever. In fact, the availability of wireless connection everywhere comes with security threats that, ...
Comprehensive review of cybercrime detection techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms ...