-
261
Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices
Published 2015-06-01Get full text
Article -
262
A survey on secure communication technologies for smart grid cyber physical system
Published 2024-12-01“…A CPS combines physical components, computational elements, and communication networks. The smart grid CPS (SG-CPS) is an example of such a system, featuring physical devices with diverse communication needs and intermediary networks. …”
Get full text
Article -
263
A lightweight framework to secure IoT devices with limited resources in cloud environments
Published 2025-07-01“…Finally, the model also makes use of a novel leaf-cut feature optimization strategy and tight adaptive cloud edge intelligence to achieve high accuracy while minimizing memory and computation demand. …”
Get full text
Article -
264
GFADE: generalized feature adaptation and discrimination enhancement for deepfake detection
Published 2025-05-01Get full text
Article -
265
Machine learning based intrusion detection framework for detecting security attacks in internet of things
Published 2024-12-01“…Thus, to solve this issue, herein, we propose an advance Intrusion detection framework using Self-Attention Progressive Generative Adversarial Network (SAPGAN) framework for detecting security threats in IoT networks. …”
Get full text
Article -
266
Design of an iterative method for disease prediction in finger millet leaves using graph networks, dyna networks, autoencoders, and recurrent neural networks
Published 2024-12-01“…This work proposes a comprehensive framework for detection and prediction of the disease in Finger Millet leaves using a combination of Graph Networks, Dyna Networks, Autoencoders, and Recurrent Neural Networks. …”
Get full text
Article -
267
Securing IoT-Cloud Applications with AQ-KGMO-DMG Enhanced SVM for Intrusion Detection
Published 2025-02-01“…Intrusion detection, as a cornerstone of information security, plays a pivotal role in fortifying networks against potential threats, emphasizing the necessity for robust and reliable methods capable of discerning and mitigating network vulnerabilities effectively. …”
Get full text
Article -
268
An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security
Published 2025-01-01Get full text
Article -
269
Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems
Published 2024-09-01“…Convolutional neural networks (CNN) are used for spatial feature extraction and superfluous data are filtered to improve computing efficiency. …”
Get full text
Article -
270
Transfer learning for securing electric vehicle charging infrastructure from cyber-physical attacks
Published 2025-03-01Get full text
Article -
271
Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System
Published 2020-04-01“…Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". …”
Get full text
Article -
272
-
273
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
274
Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment
Published 2025-06-01Get full text
Article -
275
A secure and efficient deep learning-based intrusion detection framework for the internet of vehicles
Published 2025-04-01“…Vision Transformer (ViT), wavelet transforms, and GAT ensure effective feature extraction, and a novel hybrid optimization known as Crayfish-Mother secure Optimization (CMSO) method is proposed to optimize feature selection to its maximum and reduce computational cost. …”
Get full text
Article -
276
Edge computing privacy protection method based on blockchain and federated learning
Published 2021-11-01“…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
Get full text
Article -
277
Security-Enhanced Lightweight Authentication Key-Agreement Protocol for Unmanned Aerial Vehicle Communication
Published 2025-04-01“…Unmanned aerial vehicles have been widely employed in recent years owing to their remarkable features such as low environmental requirements and high survivability, and a new tendency towards networking, intelligence, and collaboration has emerged. …”
Get full text
Article -
278
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01Get full text
Article -
279
CANGuard: An Enhanced Approach to the Detection of Anomalies in CAN-Enabled Vehicles
Published 2025-01-01Get full text
Article -
280