Network & Distributed Systems: المرسلات الحديثة
السجلات المعروضة 81 -- 100 من 142
-
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the ... -
Policy specification and verification for blockchain and smart contracts in 5G networks
( Korean Institute of Communications Information Sciences , 2020 , Article)Blockchain offers unprecedented opportunities for innovation in financial transactions. A whole new world of opportunities for banking, lending, insurance, money transfer, investments, and stock markets awaits. However, ... -
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
( Elsevier B.V. , 2021 , Article)Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ... -
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
( Association for Computing Machinery , 2021 , Conference)Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ... -
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
( Elsevier B.V. , 2022 , Article)6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ... -
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
( Hindawi Limited , 2022 , Article)Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ... -
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
( Elsevier Ltd , 2022 , Article)With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering ... -
Machine learning for the security of healthcare systems based on Internet of Things and edge computing
( Elsevier , 2022 , Book chapter)Using the Internet of Medical Things (IoMT) for treatment and diagnosis has exponentially grown due to its diverse use cases and efficient planning with defined resources. IoMT in the e-healthcare system enables continuous ... -
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ... -
Watermarking: A review of software and hardware techniques
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ... -
A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ... -
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ... -
Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
( Tech Science Press , 2023 , Article)The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. ... -
Minimizing energy consumption of IoT devices for O-RAN based IoT systems
( Elsevier , 2023 , Article)The implementation of Open Radio Access Network (O-RAN) architecture in Internet of Things (IoT) systems has garnered significant attention as a means to fulfill the stringent requirements of ultra-low latency and ultra-low ... -
Edge intelligence-enabled cyber-physical systems
( John Wiley and Sons Ltd , 2023 , Article)With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse ... -
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
( Springer , 2023 , Article)Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ... -
DQN based Blockchain Data Storage in Resource-constrained IoT System
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference)Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ... -
Secure Vehicular Platoon Management against Sybil Attacks
( MDPI , 2022 , Article)The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ... -
Preface : Journal of Physics: Conference Series
( Institute of Physics , 2022 , Other)2022 2nd International Conference on Electron Devices and Applications was held virtually during May 13-15, 2022 via Zoom platform due to the pandemic of COVID-19. With a satisfactory ending of ICEDA 2021, ICEDA 2022 has ...