Search Results - "Security and communication networks"
-
1
FairAccess: a new Blockchain‐based access control framework for the Internet of Things
Published in Security and communication networks (01-12-2016)“…Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT‐related standards and…”
Get full text
Journal Article -
2
Performance Analysis of Hyperledger Fabric Platforms
Published in Security and communication networks (01-01-2018)“…Blockchain is a key technology that has the potential to decentralize the way we store, share, and manage information and data. One of the more recent…”
Get full text
Journal Article -
3
A DDoS Attack Detection Method Based on SVM in Software Defined Network
Published in Security and communication networks (01-01-2018)“…The detection of DDoS attacks is an important topic in the field of network security. The occurrence of software defined network (SDN) (Zhang et al., 2018)…”
Get full text
Journal Article -
4
Security and Privacy in the Medical Internet of Things: A Review
Published in Security and communication networks (01-01-2018)“…Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people…”
Get full text
Journal Article -
5
Software‐defined networking (SDN): a survey
Published in Security and communication networks (01-12-2016)“…With the advent of cloud computing, many new networking concepts have been introduced to simplify network management and bring innovation through network…”
Get full text
Journal Article -
6
DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System
Published in Security and communication networks (2020)“…Many studies utilized machine learning schemes to improve network intrusion detection systems recently. Most of the research is based on manually extracted…”
Get full text
Journal Article -
7
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning
Published in Security and communication networks (13-10-2019)“…Users and Internet service providers (ISPs) are constantly affected by denial-of-service (DoS) attacks. This cyber threat continues to grow even with the…”
Get full text
Journal Article -
8
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security
Published in Security and communication networks (2021)“…Wireless sensor networks (WSN) have problems such as limited power, weak computing power, poor communication ability, and vulnerability to attack. However, the…”
Get full text
Journal Article -
9
Privacy in the Internet of Things: threats and challenges
Published in Security and communication networks (01-12-2014)“…ABSTRACTThe Internet of Things paradigm envisions the pervasive interconnection and cooperation of smart things over the current and future Internet…”
Get full text
Journal Article -
10
Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions
Published in Security and communication networks (09-07-2022)“…In the last decade, huge growth is recorded globally in computer networks and Internet of Things (IoT) networks due to the exponential data generation,…”
Get full text
Journal Article -
11
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
Published in Security and communication networks (01-01-2018)“…The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT…”
Get full text
Journal Article -
12
Authentication Protocols for Internet of Things: A Comprehensive Survey
Published in Security and communication networks (01-01-2017)“…In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication…”
Get full text
Journal Article -
13
Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges
Published in Security and communication networks (03-02-2022)“…Nowaday, emails are used in almost every field, from business to education. Emails have two subcategories, i.e., ham and spam. Email spam, also called junk…”
Get full text
Journal Article -
14
A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets
Published in Security and communication networks (2020)“…The problem of network intrusion detection poses innumerable challenges to the research community, industry, and commercial sectors. Moreover, the persistent…”
Get full text
Journal Article -
15
A speculative approach to spatial‐temporal efficiency with multi‐objective optimization in a heterogeneous cloud environment
Published in Security and communication networks (25-11-2016)“…A heterogeneous cloud system, for example, a Hadoop 2.6.0 platform, provides distributed but cohesive services with rich features on large‐scale management,…”
Get full text
Journal Article -
16
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications
Published in Security and communication networks (2021)“…Recently, interest in Internet of Vehicles’ (IoV) technologies has significantly emerged due to the substantial development in the smart automobile industries…”
Get full text
Journal Article -
17
Steganalysis of least significant bit matching using multi-order differences
Published in Security and communication networks (01-08-2014)“…ABSTRACT This paper presents a learning‐based steganalysis/detection method to attack spatial domain least significant bit (LSB) matching steganography in…”
Get full text
Journal Article -
18
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
Published in Security and communication networks (01-01-2018)“…The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but…”
Get full text
Journal Article -
19
Rational Protocols and Attacks in Blockchain System
Published in Security and communication networks (24-09-2020)“…Blockchain has been an emerging technology, which comprises lots of fields such as distributed systems and Internet of Things (IoT). As is well known,…”
Get full text
Journal Article -
20
Multi-region Nonuniform Brightness Correction Algorithm Based on L-Channel Gamma Transform
Published in Security and communication networks (23-04-2022)“…Nonuniform brightness distribution of collimator reticle images leads to the recognition difficulty of reticle grids and coordinate scales on images and…”
Get full text
Journal Article