Results 71 to 80 of about 462,961 (193)
Privacy-Friendly Collaboration for Cyber Threat Mitigation [PDF]
Sharing of security data across organizational boundaries has often been advocated as a promising way to enhance cyber threat mitigation. However, collaborative security faces a number of important challenges, including privacy, trust, and liability ...
Brito, Alex +2 more
core
While neural networks demonstrate stronger capabilities in pattern recognition nowadays, they are also becoming larger and deeper. As a result, the effort needed to train a network also increases dramatically. In many cases, it is more practical to use a
Liu, Yuntao +2 more
core +1 more source
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs ...
Asokan, N. +6 more
core +1 more source
eFPGA-Based Datapath Redaction for Processor IP Protection
Logic locking and eFPGA-based redaction have emerged as promising security-by-design approaches for protecting hardware intellectual property (IP) in outsourced fabrication.
Tomosuke Ichioka +2 more
doaj +1 more source
Middleware-based Security for Hyperconnected Applications in Future In-Car Networks
Today’s cars take advantage of powerful electronic platforms and provide more and more sophisticated connected services. More than just ensuring the role of a safe transportation mean, they process private information, industrial secrets, communicate ...
Alexandre Bouard +2 more
doaj +1 more source
IP SafeGuard–An AI-Driven Malicious IP Detection Framework
The rising frequency and sophistication of cyberattacks have made real-time malicious IP detection a critical challenge for modern Security Operations Center (SOC).
Abdullah Al Siam +5 more
doaj +1 more source
User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
VoIP, which is used to transmit voice data on the Internet, is being welcomed as a replacement for the PSTN. In VoIP, voice data are converted to IP data and transmitted in an ordinary IP network.
Ho-Kyung Yang +3 more
doaj +1 more source
Security Architecture for Thin Client Network
Client-server is a modern shift in computing paradigm that different from traditional (pc-server) computing in the sense that data resides remotely on the server, this makes centralized management data possible. Client-server has an edge over traditional
O. A. Okunade
doaj
This book chapter highlights the embedded system security by designing a secure smart card IP. Indeed, the smart card is recognized as a privileged means of both storing confidential information and performing secure transactions. Its main role comes from the security it provides inside the system it is a part of.
openaire +1 more source
Securing IoT Networks from DDoS Attacks Using a Temporary Dynamic IP Strategy
The progression of the Internet of Things (IoT) has brought about a complete transformation in the way we interact with the physical world. However, this transformation has brought with it a slew of challenges. The advent of intelligent machines that can
Ahmad Hani El Fawal +3 more
doaj +1 more source

