A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications

R Praveen, P Pabitha - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Abstract The Internet of Medical Things (IoMT) is a network of medical devices, hardware
infrastructure, and software that allows healthcare information technology to be …

[HTML][HTML] Advanced persistent threat attack detection method in cloud computing based on autoencoder and softmax regression algorithm

FJ Abdullayeva - Array, 2021 - Elsevier
Abstract APT (Advanced Persistent Threat) is a complex type of attack that steals personal
data by staying in the infected system for a long time. When APT attacks take place in a …

Information security in M-learning systems: Challenges and threats of using cookies

D Korać, B Damjanović, D Simić - 2020 19th International …, 2020 - ieeexplore.ieee.org
The trend of rapid development of mobile technologies has highlighted new challenges and
threats regarding the information security by the using cookies in mobile learning (m …

A model of digital identity for better information security in e-learning systems

D Korać, B Damjanović, D Simić - The Journal of Supercomputing, 2022 - Springer
The trend of rapid development of information technologies is creating new challenges in
information security such as security management of identities in e-learning systems. In …

Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks

ADA Dawar - International Journal of Mathematics, Statistics, and …, 2024 - ijmscs.org
The communication network would have potential uses dependent on the infrastructure
once the fifth generation (5G) network is fully commercialized. Subscriber Identification …

[HTML][HTML] A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity

D Korać, B Damjanović, D Simić, KKR Choo - Journal of King Saud …, 2022 - Elsevier
Cross-site scripting (XSS) attacks have been extensively studied in the literature, although
mitigating such attacks remain a challenge for cyber defenders. In this paper, we survey the …

[HTML][HTML] GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment

Y Ali, HU Khan - Computers & Industrial Engineering, 2022 - Elsevier
Abstract Industry Internet of Things (IIoT) has become the most evolving area over the last
few years. The number of IoT devices connected in industry has sharply elevated but this …

A MMEM-BN–Based Analyzing Framework for Causal Analysis of Ship Collisions

Y Tian, H Qiao, L Hua - ASCE-ASME Journal of Risk and …, 2024 - ascelibrary.org
Exploring the causes and evolution of ship collisions plays an important role in accident
prevention and risk control. This paper proposes a hybrid analyzing framework based on …

Disadvantaged by disability: examining the accessibility of cyber security

S Furnell, K Helkala, N Woods - International Conference on Human …, 2021 - Springer
Today, we are living in a digitally dependent world. Through the use of digital technologies,
life is meant to be easier and streamlined. This includes giving access to services that …

Using ethereum smart contracts for payment´ transactions

S Tripković, D Simić - International Symposium SymOrg, 2022 - Springer
Blockchain as a technology is being more and more common, both in software development
industry and in many spheres of business, such as law, finance and many others. The use of …