Πλοήγηση ανά Θέμα "Security"
Αποτελέσματα 1-16 από 16
-
Blockchain State Channels: A State of the Art
(2021)Blockchain technology has been quite popular during recent years and it finally seems to present a significant rise with respect to its use for real-world applications. This advancement has brought up a critical challenge ... -
A Blockchained Secure and Integrity-Preserved Architecture for Military Logistics Operations
(2022)The employment of 5G Internet of Things (5G-IoT), smart automation, and AI analytics can provide improved military logistics, by enhancing inventory control, reordering, accuracy, flexibility mobility, and real-time ... -
Collaborative agent-based detection of DDoS IoT botnets
(2019)The Internet of Things constitutes the latest paradigm shift in computing. Billions of devices sense the real world and store produced data in the cloud. Existing security models, approaches and solutions are not able to ... -
Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets
(2019)Internet of Things is one of the most significant latest developments in computer science. It is common for modern computing infrastructures to partially consist of numerous low power devices that are characterized by high ... -
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
(2007)Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performance of wireless networks, with effects similar to those of Denial of Service (DoS) attacks. In this paper we consider the ... -
Detection of abnormal behavior in smart-home environments
(2019)Without a doubt, the security of Internet of Things (IoT) systems is of crucial importance. The use of such systems has significantly increased in the recent year, where in every aspect of our daily life we interact with ... -
Electric Vehicle Charging: A Survey on the Security Issues and Challenges of the Open Charge Point Protocol (OCPP)
(2022)The increased use of smart Electric Vehicles (EVs) and Plug-in Electric Vehicles (PEV) opened a new area of research and development. The number of EV charging sites has considerably increased in residential as well as in ... -
Enhancing Food Supply Chain Security through the Use of Blockchain and TinyML
(2022)Food safety is a fundamental right in modern societies. One of the most pressing problems nowadays is the provenance of food and food-related products that citizens consume, mainly due to several food scares and the ... -
Machine learning for all: A more robust federated learning framework
(2019)Machine learning and especially deep learning are appropriate for solving multiple problems in various domains. Training such models though, demands significant processing power and requires large data-sets. Federated ... -
Multi-screen lock: Visual passwords from user’s social data
(2019)A critical issue for a mobile device user is the protection of stored sensitive data and their access, via the device. A widely used technique for protecting the mobile device with a display is the lock screen. Many security ... -
Optimal jamming attack strategies and network defense policies in wireless sensor networks
(2010)We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-access-based wireless sensor network operates. The jammer controls the probability of jamming and the transmission range in ... -
Private 5G Networks: Concepts, Architectures, and Research Landscape
(2022)A private fifth generation (5G) network is a dedicated 5G network with enhanced communication characteristics, unified connectivity, optimized services, and customized security within a specific area. By subsuming the ... -
A secure VoIP conference system: Architecture analysis and design issues
(2007)In this paper we present the architectural design of a secure VoIP conference system for mobile devices, which is using the strong security mechanisms of the Z Real Time Transport Protocol (ZRTP). We also provide implementation ... -
Security and Privacy Concerns for Healthcare Wearable Devices and Emerging Alternative Approaches
(2022)The wide use of wearable devices rises a lot of concerns about the privacy and security of personal data that are collected and stored by such services. This concern is even higher when such data is produced by healthcare ... -
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
(2018)This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ... -
Security Revisited: Honeytokens meet Google Authenticator
(2022)In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors ...