[PDF][PDF] Security, trust, and privacy in machine learning-based Internet of Things

W Meng, W Li, J Han, C Su - Security and Communication Networks, 2022 - orbit.dtu.dk
Internet of ings (IoT) allows billions of devices in the physical world as well as virtual
environments to exchange data with each other intelligently. e worldwide government …

RepuFilter: Prevention of Untrusted Packet Spread Based on Trust Evaluation in Wireless Networks

H Bao, X Zhang, G Wang, M Zhang… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Wireless networks are vulnerable to many attacks due to its dynamic environments.
Unrestricted forwarding of packets from untrusted sources in wireless networks has caused …

PoAS: Enhanced Consensus Algorithm for Collaborative Blockchain Intrusion Detection System

EA Winanto, MY bin Idris, D Stiawan… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Signature-based Collaborative Intrusion Detection System (CIDS) deeply depends on the
reliability of nodes to produce attack signatures. Each node in the network is responsible to …

Raspberry pi-based intelligent cyber defense systems for smes: An exploratory study

SS Tirumala, N Nepal, SK Ray - International Summit Smart City 360°, 2021 - Springer
Ongoing ransomware attacks have forced business to think about security of their resources.
Recently, small-to-medium enterprises (SMEs) have become easy targets for attackers since …

Securing data in decentralized cloud storage for authorized encrypted search with privacy-preserving on healthcare databases

ST Pokharkar, LK Vishwamitra - 2021 10th IEEE International …, 2021 - ieeexplore.ieee.org
Nowadays, in the medical field number of applications will do develop for overcoming the
complexity of previous work. By using information technology and computer science to …

Reliable and hybridized trust based algorithm to thwart blackhole attacks in manets using network preponderant determinants

M Thebiga, S Pramila - 2020 - learntechlib.org
This Mobile adhoc networks is a perpetual and autogenous organization without framework,
and the mobile nodes are coupled cordlessly. Owing to the deficiency of framework …

[PDF][PDF] Privacy protection of encrypted medical data over multi-authority cloud system

M Ahmed, TS Shavali - 2018 - oaijse.com
In the present-day cloud computing Private sensitive data service utilization of independent
and corporate needs enormous computational power and scalability over data storage …

[PDF][PDF] CLIPS: Customized Levels of IoT Privacy and Security

RY Venkata, K Kavi - ICSEA 2017, 2017 - academia.edu
Internet of Things (IoT) refers to systems that can be attached to the Internet and thus can be
accessed and controlled remotely. Such devices are essential for creating” smart things” like …

Efficient threat context-aware packet filtering for network protection

S Moore, JR Rogers, V Mutolo, PP Geremia - US Patent 11,824,875, 2023 - Google Patents
A threat intelligence gateway (TIG) may protect TCP/IP networks from network (eg, Internet)
threats by enforcing certain policies on in-transit packets that are crossing network …

Efficient threat context-aware packet filtering for network protection

S Moore, JR Rogers, V Mutolo, PP Geremia - US Patent 11,552,970, 2023 - Google Patents
(57) ABSTRACT A threat intelligence gateway (TIG) may protect TCP/IP networks from
network (eg, Internet) threats by enforcing certain policies on in-transit packets that are …