بحث بسيط
السجلات المعروضة 1 -- 10 من 14
DLRT: Deep learning approach for reliable diabetic treatment
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin ...
A review of security challenges, attacks and resolutions for wireless medical devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have ...
Quantifying caching effects in urban VANETs
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Most applications in urban Vehicular Ad hoc NETworks (VANETs) rely on information sharing, such as real-Time traffic information queries, advertisements, etc. However, existing data dissemination techniques cannot guarantee ...
Analysis of discovery and access procedure for D2D communication in 5G cellular network
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Device-To-device (D2D) communication, which is defined as a direct communication between two mobile users without traversing the Base Station (BS) or the core network to offload the increasing traffic to the user equipments, ...
POKs based secure and energy-efficient access control for implantable medical devices
(
Springer
, 2019 , Conference Paper)
Implantable medical devices (IMDs), such as pacemakers, implanted cardiac defibrillators and neurostimulators are medical devices implanted into patients' bodies for monitoring physiological signals and performing medical ...
Protecting private cloud located within public cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
Many studies use cryptographic technologies to protect sensitive data in public cloud. However, these approaches may introduce large overheads. Recently, hybrid cloud started to gain a lot of attentions. A hybrid cloud ...
Haddle: A framework for investigating data leakage attacks in hadoop
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ...
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference Paper)
BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ...
Auditing cloud service level agreement on VM CPU speed
(
IEEE Computer Society
, 2014 , Conference Paper)
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ...
A novel chaos-based physical layer security transmission scheme for internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ...