过去一年中添加的文章,按日期排序

[HTML][HTML] Towards a lightweight security framework using blockchain and machine learning

S Ismail, M Nouman, DW Dawoud, H Reza - Blockchain: Research and …, 2024 - Elsevier
210 天前 - … propose an integrated security framework using blockchain and Machine Learning
(ML… study presents a lightweight, integrated security framework that combines the power of …

[PDF][PDF] Secure and Efficient Federated Learning in Edge Computing

R Jin - 2024 - ore.exeter.ac.uk
51 天前 - toward secure and efficient FL in edge computing. First, a novel lightweight
blockchain-based FL framework … witnessed the rapid development of Machine Learning (ML), …

Evolution of Malware Targeting IoT Devices and Botnet formation

B Sutheekshan, S Basheer… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
139 天前 - … obstruction towards inter-related complexes security. … DDoS attack or performing
cryptocurrency mining. Cases are … detection, and machine learning techniques all contribute to …

Federated distillation and blockchain empowered secure knowledge sharing for internet of medical things

X Zhou, W Huang, W Liang, Z Yan, J Ma, Y Pan… - Information …, 2024 - Elsevier
150 天前 - … of our proposed model toward secure and effective data … , a lightweight distributed
deep learning framework, called Federated Distillation and Blockchain empowered Secure

[图书][B] Information and Communications Security: 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings

D Wang, M Yung, Z Liu, X Chen - 2023 - books.google.com
252 天前 - … an overview of TEEs’ security features, threat models, … crypto systems, and show
how crypto and TEE may complement each other and be combined to realize practical security

[图书][B] Digital Forensics and Cyber Crime: 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings

S Goel, P Gladyshev, A Nikolay, G Markowsky… - 2023 - books.google.com
348 天前 - … developing and using digital forensic technologies and techniques for a variety of
applications in criminal investigations, incident response and broader information security. In …