Search
Now showing items 1-10 of 43
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference)
Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
Watermarking: A review of software and hardware techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference)
Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ...
A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference)
This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
Towards robust autonomous driving systems through adversarial test set generation
(
ISA - Instrumentation, Systems, and Automation Society
, 2023 , Article)
Correct environmental perception of objects on the road is vital for the safety of autonomous driving. Making appropriate decisions by the autonomous driving algorithm could be hindered by data perturbations and more ...
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Article)
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ...
Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring
(
IEEE
, 2024 , Article)
The traditional healthcare system is increasingly challenged by its dependence on inperson consultations and manual monitoring, struggling with issues of scalability, the immediacy of care, and efficient resource allocation. ...
The Future of Aerial Communications: A Survey of IRS-Enhanced UAV Communication Technologies
(
IEEE
, 2024 , Conference)
The advent of Intelligent Reflecting Surfaces (IRS) and Unmanned Aerial Vehicles (UAVs) is setting a new benchmark in the field of wireless communications. IRS, with their groundbreaking ability to manipulate electromagnetic ...