J Liu, B Kantarci, C Adams - Proceedings of the 2nd ACM workshop on …, 2020 - dl.acm.org
Wide adoption of Internet of Things (IoT) devices and applications encounters security vulnerabilities as roadblocks. The heterogeneous nature of IoT systems prevents common …
An anomaly exposure system's foremost objective is to categorize the behavior of the system into normal and untruthful actions. To estimate the possible incidents, the administrators of …
Nowadays, there is a growing demand for information security and security rules all across the world. Intrusion detection (ID) is a critical technique for detecting dangers in a network …
VA Cotella - Automation in Construction, 2023 - Elsevier
Interest in semantic segmentation of 3D point clouds using ML and DL has grown due to their key role in scene insight across a wide range of computer vision, robotics and remote …
The Internet of Things (IoT) has brought significant advancements that have connected our world more closely than ever before. However, the growing number of connected devices …
Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It's Zero-day variants are even more hazardous, as less is known about them. In this …
In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption …
Green Connected and Autonomous Vehicles (CAVs) are the future of next-generation Intelligent Transportation Systems (ITS) that will help humans to improve road safety and …
For IoT security to function properly, it is necessary to identify anomalies and suspicious activities in the Internet of things (IoT) network in order to keep an eye on things and stop …