Results 31 to 40 of about 161,956 (247)

An n-sided polygonal model to calculate the impact of cyber security events

open access: yes, 2016
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP ...
F Cuppens   +6 more
core   +1 more source

Security in Cyber-Physical Systems [PDF]

open access: yes2019 Amity International Conference on Artificial Intelligence (AICAI), 2019
In this manuscript, we explore the network and cyber security challenges furthermore, issues of cyber or digital physical frameworks. (1) We epitomize the general work process of cyber or digital physical frameworks, (2) identify the conceivable vulnerabilities, assault issues, foes qualities and an arrangement of difficulties that are required to be ...
Joanita Dsouza   +3 more
openaire   +1 more source

MOBIUS: Model-Oblivious Binarized Neural Networks

open access: yesIEEE Access, 2019
A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i.e., oblivious neural network or encrypted prediction, has been studied in ...
Hiromasa Kitai   +9 more
doaj   +1 more source

Optimization Models in Cyber-Physical Power Systems: A Review

open access: yesIEEE Access, 2022
The growing interconnection between information networks and power grids enables a more efficient and economical operation, but also introduces significant challenges in modern cyber-physical power systems, such as malicious cyber-attacks.
Shahab Karamdel   +3 more
doaj   +1 more source

Game based cyber security training: are serious games suitable for cyber security training? [PDF]

open access: yes, 2016
Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance.
Al-Sherbaz, Ali   +2 more
core   +2 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Fast Polar Decoding With Successive Cancellation List Creeper Algorithm

open access: yesIEEE Access
Polar codes have emerged as a focal point in the field of error-correcting codes, owing to their remarkable capacity-achieving characteristics and their relevance in various modern communication systems. The basic successive cancellation (SC) approach is
Ilya Timokhin, Fedor Ivanov
doaj   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Dual Rate Control for Security in Cyber-physical Systems

open access: yes, 2015
We consider malicious attacks on actuators and sensors of a feedback system which can be modeled as additive, possibly unbounded, disturbances at the digital (cyber) part of the feedback loop.
Hirzallah, Nabil   +2 more
core   +1 more source

Wireless and Physical Security via Embedded Sensor Networks [PDF]

open access: yes, 2008
Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the ...
Bestavros, Azer, Ocean, Michael J.
core   +2 more sources

Home - About - Disclaimer - Privacy