Search
Now showing items 11-20 of 20
Secure Authentication and Key Agreement Protocol for Tactile Internet-based Tele-Surgery Ecosystem
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the recent advancements in wireless communications, Tactile Internet (TI) has witnessed a major blow. TI is considered the next big evolution that will provide real-time control in industrial setups, particularly in ...
Data Augmentation for Intrusion Detection and Classification in Cloud Networks
(
IEEE
, 2021 , Conference Paper)
Cloud computing is a paradigm that provides multiple services over the internet with high flexibility in a cost-effective way. However, the growth of cloud-based services comes with major security issues. Recently, machine ...
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...
A Modified Layer of Protection Analysis for Cyber-Physical Systems Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Layer of Protection Analysis (LOPA) is the most commonly used approach for quantitative safety risk assessment in the process control industry to protect a Cyber- Physical System (CPS) from accidental hazards-causing ...
DTW based Authentication for Wireless Medical Device Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Wireless medical devices play an important role in providing safety and privacy to patients suffering from major health issues. These light-weight devices can be worn inside or outside the patient's body and provide more ...
Energy-Harvesting Based Jammer Localization: A Battery-Free Approach in Wireless Sensor Networks
(
IEEE
, 2022 , Conference Paper)
Wireless enabling technologies in critical infrastructures are increasing the efficiency of communications. Most of these technologies are vulnerable to jamming attacks. Jamming attacks are among the most effective ...
Managing Security Control Assumptions Using Causal Traceability
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
Performance evaluation of TCP and UDP traffic in IEEE 1451 compliant healthcare infrastructure
(
Springer Nature
, 2012 , Conference Paper)
Wireless ad-hoc and intrastructure networks have become very popular during the last ten years. Due to this reason, wireless security has become a very serious issue, specially in healthcare intrastructure networks. The ...
Exploring 2D Representation and Transfer Learning Techniques for People Identification in Indoor Localization
(
Institute of Electrical and Electronics Engineers Inc. (IEEE)
, 2023 , Conference Paper)
Indoor localization is a crucial aspect of various disciplines in our daily lives. It enables efficient administration tasks and improves safety by identifying the position of items or people inside spaces, making it useful ...