Results 71 to 80 of about 462,961 (193)

Privacy-Friendly Collaboration for Cyber Threat Mitigation [PDF]

open access: yes, 2017
Sharing of security data across organizational boundaries has often been advocated as a promising way to enhance cyber threat mitigation. However, collaborative security faces a number of important challenges, including privacy, trust, and liability ...
Brito, Alex   +2 more
core  

Neural Trojans

open access: yes, 2017
While neural networks demonstrate stronger capabilities in pattern recognition nowadays, they are also becoming larger and deeper. As a result, the effort needed to train a network also increases dramatically. In many cases, it is more practical to use a
Liu, Yuntao   +2 more
core   +1 more source

IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

open access: yes, 2016
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs ...
Asokan, N.   +6 more
core   +1 more source

eFPGA-Based Datapath Redaction for Processor IP Protection

open access: yesIEEE Access
Logic locking and eFPGA-based redaction have emerged as promising security-by-design approaches for protecting hardware intellectual property (IP) in outsourced fabrication.
Tomosuke Ichioka   +2 more
doaj   +1 more source

Middleware-based Security for Hyperconnected Applications in Future In-Car Networks

open access: yesEAI Endorsed Transactions on Mobile Communications and Applications, 2013
Today’s cars take advantage of powerful electronic platforms and provide more and more sophisticated connected services. More than just ensuring the role of a safe transportation mean, they process private information, industrial secrets, communicate ...
Alexandre Bouard   +2 more
doaj   +1 more source

IP SafeGuard–An AI-Driven Malicious IP Detection Framework

open access: yesIEEE Access
The rising frequency and sophistication of cyberattacks have made real-time malicious IP detection a critical challenge for modern Security Operations Center (SOC).
Abdullah Al Siam   +5 more
doaj   +1 more source

User Access Control and Authentication System for VoIP Service in Mobile Communication Environments

open access: yesInternational Journal of Distributed Sensor Networks, 2014
VoIP, which is used to transmit voice data on the Internet, is being welcomed as a replacement for the PSTN. In VoIP, voice data are converted to IP data and transmitted in an ordinary IP network.
Ho-Kyung Yang   +3 more
doaj   +1 more source

Security Architecture for Thin Client Network

open access: yesArid Zone Journal of Engineering, Technology and Environment, 2017
Client-server is a modern shift in computing paradigm that different from traditional (pc-server) computing in the sense that data resides remotely on the server, this makes centralized management data possible. Client-server has an edge over traditional
O. A. Okunade
doaj  

Secure Smart Card IP

open access: yes
This book chapter highlights the embedded system security by designing a secure smart card IP. Indeed, the smart card is recognized as a privileged means of both storing confidential information and performing secure transactions. Its main role comes from the security it provides inside the system it is a part of.
openaire   +1 more source

Securing IoT Networks from DDoS Attacks Using a Temporary Dynamic IP Strategy

open access: yesSensors
The progression of the Internet of Things (IoT) has brought about a complete transformation in the way we interact with the physical world. However, this transformation has brought with it a slew of challenges. The advent of intelligent machines that can
Ahmad Hani El Fawal   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy