Search
Now showing items 71-80 of 100
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems
(
IEEE Computer Society
, 2021 , Article)
In softwarized industrial networking, honeypot identification is very important for both the attacker and the defender. Existing honeypot identification relies on simple features of honeypot. There exist two challenges: ...
TamForen: A tamper-proof cloud forensic framework
(
John Wiley and Sons Inc
, 2022 , Article)
Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive ...
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ...
Optimal Cooperative Relaying and Power Control for IoUT Networks with Reinforcement Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Internet of Underwater Things (IoUT) consists of numerous sensor nodes distributed in an underwater area for sensing, collecting, processing information, and sending related messages to the data processing center. However, ...
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ...
An adaptive cache management approach in ICN with pre-filter queues
(
Elsevier B.V.
, 2020 , Article)
In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ...
Fault diagnosis based on deep learning for current-carrying ring of catenary system in sustainable railway transportation
(
Elsevier Ltd
, 2021 , Article)
In the intelligent traffic transportation, the security and stability are vital for the sustainable transportation and efficient logistics. The fault diagnosis on the catenary system is crucial for the railway transportation. ...
A Blockchain-Based Storage System with Financial Incentives for Load-balancing
(
IEEE Computer Society
, 2021 , Article)
Most storage systems adopt distributed architecture to reach high reliability. In these distributed systems, a well-balanced data distribution can improve storage reliability. However, existing schemes rely on dealers to ...
Blockchain-Based Anonymous Authentication with Selective Revocation for Smart Industrial Applications
(
IEEE Computer Society
, 2020 , Article)
Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential ...