بحث بسيط
السجلات المعروضة 91 -- 96 من 96
Malicious mining code detection based on ensemble learning in cloud computing environment
(
Elsevier B.V.
, 2021 , Article)
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ...
A deep learning-based approach for fault diagnosis of current-carrying ring in catenary system
(
Springer Science and Business Media Deutschland GmbH
, 2021 , Article)
In the Industrial Internet of Things, the deep learning-based methods are used to help solve various problems. The current-carrying ring as one of important components on the catenary system which is always small in the ...
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
With the widespread use of Android devices, research on their security has attracted increasing attention. However, at present, digital forensics for investigating attacks, such as social engineering attacks and phishing ...
Accountable credential management system for vehicular communication
(
Elsevier Inc.
, 2020 , Article)
Social Internet of Vehicles (SIoV) is becoming a reality where private and secure communication is a prerequisite. Various standardization organizations and studies have reached a consensus to use Vehicular Public-key ...
Collaborative Intrusion Detection for VANETs: A Deep Learning-Based Distributed SDN Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Vehicular Ad hoc Network (VANET) is an enabling technology to provide a variety of convenient services in intelligent transportation systems, and yet vulnerable to various intrusion attacks. Intrusion detection systems ...
A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Internet of Things technology has been used in a wide range of fields, ranging from industrial applications to individual lives. As a result, a massive amount of sensitive data is generated and transmitted by IoT ...