Search
Now showing items 1-10 of 24
QATAR’S DEFENSE POLICY: SMART CHOICES OF A SMALL STATE
(
Institute of International Affairs
, 2018 , Conference Paper)
Defense policy of Qatar to a great extent depends on the geopolitical situation in the Middle East
and it’s heavily affected by the instable relations with the Gulf neighbors. Qatar has conducted a
defense policy ...
Exploring 2D Representation and Transfer Learning Techniques for People Identification in Indoor Localization
(
Institute of Electrical and Electronics Engineers Inc. (IEEE)
, 2023 , Conference Paper)
Indoor localization is a crucial aspect of various disciplines in our daily lives. It enables efficient administration tasks and improves safety by identifying the position of items or people inside spaces, making it useful ...
A Secure, Lightweight, and Privacy-Preserving Authentication Scheme for V2G Connections in Smart Grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Vehicle to Grid (V2G) is a crucial technology that enables the bidirectional flow of communication between electric vehicles (EVs) and the smart grid (SG). Undoubtedly security and privacy are inherent requirements of these ...
Anti-spoofing device for biometric fingerprint scanners
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Biometrics is a promising technology for safeguarding the personal identity and digital information of every individual. This paper describes an easy-to-integrate and inexpensive method to improve the security of fingerprint ...
A bio-inspired framework to mitigate dos attacks in software defined networking
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system ...
A formal model-based testing framework for validating an IoT solution for blockchain-based vehicles communication
(
SciTePress
, 2020 , Conference Paper)
The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every "thing" to the Internet and in particular in transportation through the Internet ...
Managing Security Control Assumptions Using Causal Traceability
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
Performance evaluation of TCP and UDP traffic in IEEE 1451 compliant healthcare infrastructure
(
Springer Nature
, 2012 , Conference Paper)
Wireless ad-hoc and intrastructure networks have become very popular during the last ten years. Due to this reason, wireless security has become a very serious issue, specially in healthcare intrastructure networks. The ...
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...