Network Security and Internet of Things
暂无分享,去创建一个
Muhammad Imran Tariq | Shahzadi Tayyaba | Salman Ayub Khan | Muhammad Waseem Ashraf | M. Ashraf | S. Tayyaba | M. Tariq | S. Khan
[1] Hai Jiang,et al. Managing Physical Layer Security in Wireless Cellular Networks: A Cyber Insurance Approach , 2018, IEEE Journal on Selected Areas in Communications.
[2] Sajjad Mahmood,et al. Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study , 2020, Arabian Journal for Science and Engineering.
[3] Fengyu Wang,et al. Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices , 2019, IEEE Access.
[4] Ranjan Bose,et al. Channel-Aware Artificial Intersymbol Interference for Enhancing Physical Layer Security , 2019, IEEE Communications Letters.
[5] Leandros A. Maglaras,et al. Employee Perspective on Information Security Related Human Error in Healthcare: Proactive Use of IS-CHEC in Questionnaire Form , 2019, IEEE Access.
[6] Wei Wei,et al. Research and Simulation of Queue Management Algorithms in Ad Hoc Networks Under DDoS Attack , 2017, IEEE Access.
[7] Qiaoyan Wen,et al. A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method , 2018, IEEE Access.
[8] Christopher N. Gutierrez,et al. Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks , 2018, IEEE Transactions on Dependable and Secure Computing.
[9] Xinchang Zhang,et al. A Survey of Networking Applications Applying the Software Defined Networking Concept Based on Machine Learning , 2019, IEEE Access.
[10] Mamoona Humayun,et al. SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET , 2019, 2019 International Conference on Computer and Information Sciences (ICCIS).
[11] Zhen Yang,et al. The Security Network Coding System With Physical Layer Key Generation in Two-Way Relay Networks , 2018, IEEE Access.
[12] George K. Karagiannidis,et al. Physical Layer Security in the Presence of Interference , 2017, IEEE Wireless Communications Letters.
[13] Noor Zaman,et al. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) , 2019, Wirel. Networks.
[14] Ilsun You,et al. A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks , 2019, IEEE Access.
[15] Sunil B. Mane,et al. Detecting lateral spear phishing attacks in organisations , 2019, IET Inf. Secur..
[16] Shahzaib Tahir,et al. Key-Based Cookie-Less Session Management Framework for Application Layer Security , 2019, IEEE Access.
[17] Yue Yang,et al. Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism , 2019, IEEE Access.
[18] Jianfeng Ma,et al. Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices , 2019, IEEE Internet of Things Journal.
[19] Dimitra Simeonidou,et al. RDNA: Residue-Defined Networking Architecture Enabling Ultra-Reliable Low-Latency Datacenters , 2018, IEEE Transactions on Network and Service Management.
[20] Prakash Ishwar,et al. Emerging NUI-Based Methods for User Authentication: A New Taxonomy and Survey , 2019, IEEE Transactions on Biometrics, Behavior, and Identity Science.
[21] Dong Wang,et al. Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT With Multiple Access Mobile Edge Computing in Smart City , 2019, IEEE Access.
[22] Ramona Trestian,et al. Next-Generation Wireless Networks Meet Advanced Machine Learning Applications , 2019, Advances in Wireless Technologies and Telecommunication.
[23] Li Li,et al. Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols , 2017, IEEE Access.
[24] Lyu Qing,et al. Physical Layer Security in Multi-Hop AF Relay Network Based on Compressed Sensing , 2018, IEEE Communications Letters.
[25] Mohammed Atiquzzaman,et al. LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey , 2018, IEEE Access.
[26] Zheng Yan,et al. A Survey on Network Security-Related Data Collection Technologies , 2018, IEEE Access.
[27] Gang Zhou,et al. Using Data Augmentation in Continuous Authentication on Smartphones , 2019, IEEE Internet of Things Journal.
[28] Wei Ni,et al. A Routing Framework for Offloading Traffic From Cellular Networks to SDN-Based Multi-Hop Device-to-Device Networks , 2018, IEEE Transactions on Network and Service Management.
[29] José María Gómez Hidalgo,et al. A study of the personalization of spam content using Facebook public information , 2017, Log. J. IGPL.
[30] Yuhui Deng,et al. HSDC: A Highly Scalable Data Center Network Architecture for Greater Incremental Scalability , 2019, IEEE Transactions on Parallel and Distributed Systems.
[31] Vinay Kolar,et al. Interaction Engineering: Achieving Perfect CSMA Handshakes in Wireless Networks , 2014, IEEE Transactions on Mobile Computing.
[32] Junji Shikata,et al. Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography , 2014, IEEE Transactions on Information Theory.
[33] Wei Liu,et al. Hierarchical edge cloud enabling network slicing for 5G optical fronthaul , 2019, IEEE/OSA Journal of Optical Communications and Networking.
[34] Walaa Hamouda,et al. Physical Layer Security in Ultra-Dense Networks , 2017, IEEE Wireless Communications Letters.
[35] Sabbir Ahmed,et al. BER Fairness and PAPR Study of Interleaved OFDMA System , 2011, Int. J. Wirel. Networks Broadband Technol..
[36] Lutz Lampe,et al. Joint Time and Spatial Reuse Handshake Protocol for Underwater Acoustic Communication Networks , 2013 .
[37] Huan Zhou,et al. V2V Data Offloading for Cellular Network Based on the Software Defined Network (SDN) Inside Mobile Edge Computing (MEC) Architecture , 2018, IEEE Access.
[38] Wei Zhang,et al. Artificial-Noise-Aided Optimal Beamforming in Layered Physical Layer Security , 2019, IEEE Communications Letters.
[39] Zhen Ling,et al. An Active De-anonymizing Attack Against Tor Web Traffic , 2017 .
[40] Mohammed Atiquzzaman,et al. Data Collection for Security Measurement in Wireless Sensor Networks: A Survey , 2019, IEEE Internet of Things Journal.
[41] Cristina Alcaraz,et al. Covert Channels-Based Stealth Attacks in Industry 4.0 , 2019, IEEE Systems Journal.
[42] Jörg Liebeherr,et al. Elements of Application-Layer Internetworking for Adaptive Self-Organizing Networks , 2019, Proceedings of the IEEE.
[43] Sandra Scott-Hayward,et al. Tennison: A Distributed SDN Framework for Scalable Network Security , 2018, IEEE Journal on Selected Areas in Communications.
[44] Lingwei Xu,et al. Physical Layer Security Performance of Wireless Mobile Sensor Networks in Smart City , 2019, IEEE Access.
[45] Sangeetha Dhamodaran,et al. Intrusion detection system for detecting wireless attacks in IEEE 802.11 networks , 2019, IET Networks.
[46] S. N. Merchant,et al. Green Symbiotic Cloud Communications: Virtualized Transport Layer and Cognitive Decision Function , 2017, IEEE Access.
[47] Susana Sargento,et al. Context-Aware Delivery of Multi-Party Communications: Access and Core Network Selection , 2012 .
[48] Jingqiang Lin,et al. Copker: A Cryptographic Engine Against Cold-Boot Attacks , 2018, IEEE Transactions on Dependable and Secure Computing.
[49] Klever Regis Pires Cavalcanti,et al. An Integrated Solution for the Improvement of the Mobile Devices Security based on the Android Platform , 2017, IEEE Latin America Transactions.
[50] Ee-Chien Chang,et al. Passive Attacks Against Searchable Encryption , 2019, IEEE Transactions on Information Forensics and Security.
[51] Steven Furnell,et al. Information security collaboration formation in organisations , 2017, IET Inf. Secur..
[52] Balachandra Muniyal,et al. Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card , 2019, IEEE Access.
[53] Dhanushka Kudathanthirige,et al. Secure Communication in Relay-Assisted Massive MIMO Downlink With Active Pilot Attacks , 2019, IEEE Transactions on Information Forensics and Security.
[54] Mohamed Cheriet,et al. Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns , 2019, IEEE Transactions on Services Computing.
[55] Raimir Holanda Filho,et al. Enabling Online Quantitative Security Analysis in 6LoWPAN Networks , 2019, IEEE Internet of Things Journal.
[56] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[57] Yuval Elovici,et al. ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology , 2017, IEEE Transactions on Information Forensics and Security.
[58] Xiapu Luo,et al. SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks , 2018, IEEE Transactions on Information Forensics and Security.
[59] Vivian Estrada Sentí,et al. Artificial intelligence techniques for information security risk assessment , 2018 .
[60] Shouling Ji,et al. Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords , 2017, IEEE Transactions on Dependable and Secure Computing.
[61] Chang-Seop Park,et al. A Group-Oriented DTLS Handshake for Secure IoT Applications , 2018, IEEE Transactions on Automation Science and Engineering.
[62] Cataldo Basile,et al. Adding Support for Automatic Enforcement of Security Policies in NFV Networks , 2019, IEEE/ACM Transactions on Networking.
[63] Yang Yi,et al. A Physical Layer Security Scheme for Mobile Health Cyber-Physical Systems , 2018, IEEE Internet of Things Journal.
[64] Tarik Taleb,et al. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.
[65] P. Santhi Thilagam,et al. DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications , 2019, IEEE Communications Surveys & Tutorials.
[66] Anantha P. Chandrakasan,et al. An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications , 2019, IEEE Journal of Solid-State Circuits.
[67] Khan A. Wahid,et al. Choice of Application Layer Protocols for Next Generation Video Surveillance Using Internet of Video Things , 2019, IEEE Access.
[68] Wolfgang Kellerer,et al. Rational Agent-Based Decision Algorithm for Strategic Converged Network Migration Planning , 2019, IEEE/OSA Journal of Optical Communications and Networking.
[69] Jianfeng Guan,et al. AID Shuffling Mechanism Based on Group-Buying Auction for Identifier Network Security , 2019, IEEE Access.
[70] Holger Boche,et al. Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks , 2019, IEEE Transactions on Information Forensics and Security.
[71] Suresh Subramaniam,et al. PODCA: a passive optical data center network architecture , 2018, IEEE/OSA Journal of Optical Communications and Networking.
[72] Naofal Al-Dhahir,et al. Impact of the Wireless Network’s PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid , 2017, IEEE Access.
[73] Adriano Valenzano,et al. Performance Evaluation and Modeling of an Industrial Application-Layer Firewall , 2018, IEEE Transactions on Industrial Informatics.
[74] Tomislav Dragicevic,et al. Software-Defined Microgrid Control for Resilience Against Denial-of-Service Attacks , 2019, IEEE Transactions on Smart Grid.
[75] Rong Geng,et al. A Software Defined Networking-Oriented Security Scheme for Vehicle Networks , 2018, IEEE Access.
[76] Dirk Dahlhaus,et al. Recursive Spatial Multiplexing with Adaptive Interference Whitening , 2017, Int. J. Wirel. Networks Broadband Technol..
[77] M. Francisca Hinarejos,et al. A Solution for Secure Certified Electronic Mail Using Blockchain as a Secure Message Board , 2019, IEEE Access.
[78] Jian Chen,et al. Transmit Beamforming for Layered Physical Layer Security , 2019, IEEE Transactions on Vehicular Technology.
[79] Xiao Lan,et al. Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3 , 2019, IEEE Transactions on Dependable and Secure Computing.
[80] Xin Huang,et al. A Handshake Protocol With Unbalanced Cost for Wireless Updating , 2018, IEEE Access.
[81] Khelchandra Thongam,et al. Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation , 2018, IET Inf. Secur..
[82] Xiangming Wen,et al. On-Demand Cooperation Among Multiple Infrastructure Networks for Multi-Tenant Slicing: a Complex Network Perspective , 2018, IEEE Access.
[83] Xianbin Wang,et al. Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication , 2018, IEEE Transactions on Vehicular Technology.
[84] Jun Xiao,et al. Distribution Network Security Situation Awareness Method Based on Security Distance , 2019, IEEE Access.
[85] George N. Rouskas,et al. SDN enabled restoration with triggered precomputation in elastic optical inter-datacenter networks , 2018, IEEE/OSA Journal of Optical Communications and Networking.