بحث بسيط
السجلات المعروضة 11 -- 20 من 21
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
With the widespread use of Android devices, research on their security has attracted increasing attention. However, at present, digital forensics for investigating attacks, such as social engineering attacks and phishing ...
A design of firewall based on feedback of intrusion detection system in cloud environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
Cloud database encryption technology based on combinatorial encryption
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Vehicle-to-cloud is a network access model that aims to share computing resources for vehicles. In vehicle-to-cloud communication, reliable links are critical. Through multipath transmission, comprehensive utilization of ...
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ...
BPFL: A Blockchain Based Privacy-Preserving Federated Learning Scheme
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Federated Learning (FL), which allows multiple participants to co-train machine Learning models without exposing local data, has been recognized as a promising method in the past few years. However, in the FL process, the ...
An efficient and privacy-preserving energy trading scheme based on blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Distributed transaction model has gradually replaced the traditional centralized transaction model and has become the leading direction of development in energy trading. As the underlying support, blockchain technology is ...
A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ...
Secure Fog-assisted Sharing for Multimedia Health Records in the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In recent years, multimedia has been widely used in the medical and health fields and plays a pivotal role in personal health records (PHR). In the PHR system, people can easily access to their PHR data, which is mainly ...
Applying artificial bee colony algorithm to the multidepot vehicle routing problem
(
John Wiley and Sons Ltd
, 2022 , Conference Paper)
With advanced information technologies and industrial intelligence, Industry 4.0 has been witnessing a large scale digital transformation. Intelligent transportation plays an important role in the new era and the classic ...