Search Results - "Gupta, Maanak"
-
1
Security and Privacy in Smart Farming: Challenges and Opportunities
Published in IEEE access (2020)“…Internet of Things (IoT) and smart computing technologies have revolutionized every sphere of 21 st century humans. IoT technologies and the data driven…”
Get full text
Journal Article -
2
From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy
Published in IEEE access (01-01-2023)“…Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models…”
Get full text
Journal Article -
3
Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future
Published in IEEE access (2021)“…Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect. With a disruption of IoT devices and applications,…”
Get full text
Journal Article -
4
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem
Published in IEEE access (2020)“…Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data spurring the rise of Artificial Intelligence (AI) based smart…”
Get full text
Journal Article -
5
Security in 5G Network Slices: Concerns and Opportunities
Published in IEEE access (01-01-2024)“…Network slicing has emerged as a cornerstone technology within the 5G ecosystem, enabling efficient resource allocation, service customization, and support for…”
Get full text
Journal Article -
6
Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems
Published in IEEE access (2021)“…Traditionally, access control solutions have focused on how to utilize a specific type of decision parameter for access control decisions. While these…”
Get full text
Journal Article -
7
Analyzing and Explaining Black-Box Models for Online Malware Detection
Published in IEEE access (2023)“…In recent years, a significant amount of research has focused on analyzing the effectiveness of machine learning (ML) models for malware detection. These…”
Get full text
Journal Article -
8
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
Published in Future internet (01-04-2023)“…The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are…”
Get full text
Journal Article -
9
Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure
Published in IEEE access (2021)“…Several organizations are utilizing cloud technologies and resources to run a range of applications. These services help businesses save on hardware…”
Get full text
Journal Article -
10
Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis
Published in Information (Basel) (01-08-2021)“…In today’s scenario, image watermarking has been an integral part in various multimedia applications. Watermarking is the approach for adding additional…”
Get full text
Journal Article -
11
Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks
Published in Information (Basel) (01-10-2021)“…The rapidly developing technology and lack of standards in the transportation industry for the proposed Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure…”
Get full text
Journal Article -
12
Automated machine learning for deep learning based malware detection
Published in Computers & security (01-02-2024)Get full text
Journal Article -
13
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets
Published in IEEE transactions on services computing (01-07-2022)“…Intelligent Transportation System (ITS) is a vision which offers safe, secure and smart travel experience to drivers. This futuristic plan aims to enable…”
Get full text
Journal Article -
14
An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles
Published in IEEE transactions on industrial informatics (01-06-2021)“…Smart cities' vision will encompass connected industrial vehicles, which will offer data-driven and intelligent services to the user. Such interaction within…”
Get full text
Journal Article -
15
Future Smart Connected Communities to Fight COVID-19 Outbreak
Published in Internet of things (Amsterdam. Online) (01-03-2021)“…Internet of Things (IoT) has grown rapidly in the last decade and continues to develop in terms of dimension and complexity, offering a wide range of devices…”
Get full text
Journal Article -
16
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme
Published in Future generation computer systems (01-06-2022)“…Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Things, where various devices with low computational power…”
Get full text
Journal Article -
17
Reachability Analysis for Attributes in ABAC With Group Hierarchy
Published in IEEE transactions on dependable and secure computing (01-01-2023)“…Attribute-based access control (ABAC) models are widely used to provide fine-grained and adaptable authorization based on the attributes of users, resources,…”
Get full text
Journal Article -
18
Explainability-Informed Targeted Malware Misclassification
Published in 2024 33rd International Conference on Computer Communications and Networks (ICCCN) (29-07-2024)“…In recent years, there has been a surge in malware attacks across critical infrastructures, requiring further research and development of appropriate response…”
Get full text
Conference Proceeding -
19
Next-generation big data federation access control: A reference model
Published in Future generation computer systems (01-07-2020)“…This paper discusses one of the most significant challenges of next-generation big data (BD) federation platforms, namely, Hadoop access control. Privacy and…”
Get full text
Journal Article -
20
The $$\mathrm {ACAC_{D}}$$ model for mutable activity control and chain of dependencies in smart and connected systems
Published in International journal of information security (01-10-2024)Get full text
Journal Article