بحث بسيط
السجلات المعروضة 1 -- 10 من 19
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network ...
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the vast increase in data transmission due to a large number of information collected by devices, data management, and security has been a challenge for organizations. Many data owners (DOs) outsource their data to ...
Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Wireless body area networks (WBANs) are often used to provide communication services for the data from the body. Since the data in WBANs are always closely related to individuals, they need to be kept secret with integrity. ...
LAMANCO: A lightweight anonymous mutual authentication scheme for n -times computing offloading in IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Nowadays in many application scenarios of Internet of Things (IoT), low latency is achieved at the cost of computing-complexity which is beyond the capabilities of IoT devices. Offloading the computing intensive tasks to ...
Security and privacy preservation in fog-based crowd sensing on the internet of vehicles
(
Academic Press
, 2019 , Article)
The emergence of fog computing enables fog-based vehicle crowd sensing (FBVC) to be utilized in various fields. However, existing privacy issues represent a primary challenge that limits the degree of participation by ...
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Conducting reputation management is very important for Internet of vehicles. However, most of the existing work evaluate the effectiveness of their schemes with settled attacking behaviors in their simulation, which cannot ...
A Friendly and Low-Cost Technique for Capturing Non-Cooperative Civilian Unmanned Aerial Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
As a result of continuous cost reduction and device miniaturization, small UAVs are now more easily accessible to the public. Consequently, numerous new applications in the civilian and commercial domains have emerged. ...
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing ...
Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As a typical ML model, support vector machine (SVM) enables efficient ...
Optimal energy trading for plug-in hybrid electric vehicles based on fog computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
A large number of plug-in hybrid electric vehicles (PHEVs) have high mobility but a small battery capacity; thus, these vehicles urgently need to make charging and discharging decisions in real time. This paper proposes a ...