Data centric trust evaluation and prediction framework for IOT

U Jayasinghe, A Otebolaku, TW Um… - 2017 ITU kaleidoscope …, 2017 - ieeexplore.ieee.org
Application of trust principals in internet of things (IoT) has allowed to provide more
trustworthy services among the corresponding stakeholders. The most common method of …

Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network

R Devi, RK Jha, A Gupta, S Jain, P Kumar - AEU-International Journal of …, 2017 - Elsevier
In the present scenario, the demand for extended coverage, low latency and increased data
rate is the need of the hour. Many emerging 5G technologies like massive Multiple Input …

SOOA: exploring special on-off attacks on challenge-based collaborative intrusion detection networks

W Li, W Meng, LF Kwok - Green, Pervasive, and Cloud Computing: 12th …, 2017 - Springer
The development of collaborative intrusion detection networks (CIDNs) aims to enhance the
performance of a single intrusion detection system (IDS), through communicating and …

A privacy-preserving framework for collaborative intrusion detection networks through fog computing

Y Wang, L Xie, W Li, W Meng, J Li - … Symposium, CSS 2017, Xi'an China …, 2017 - Springer
Nowadays, cyber threats (eg, intrusions) are distributed across various networks with the
dispersed networking resources. Intrusion detection systems (IDSs) have already become …

[图书][B] Strategies to minimize the effects of information security threats on business performance

SI Okoye - 2017 - search.proquest.com
Business leaders in Nigeria are concerned about the high rates of business failure and
economic loss from security incidents and may not understand strategies for reducing the …

Towards statistical trust computation for medical smartphone networks based on behavioral profiling

W Meng, MH Au - Trust Management XI: 11th IFIP WG 11.11 International …, 2017 - Springer
Due to the popularity of mobile devices, medical smartphone networks (MSNs) have been
evolved, which become an emerging network architecture in healthcare domain to improve …

Detecting malicious nodes in medical smartphone networks through euclidean distance-based behavioral profiling

W Meng, W Li, Y Wang, MH Au - … Symposium, CSS 2017, Xi'an China …, 2017 - Springer
With the increasing digitization of the healthcare industry, a wide range of medical devices
are Internet-and inter-connected. Mobile devices (eg, smartphones) are one common facility …