Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework

A Mishra, TS Jabar, YI Alzoubi… - … Practice and Experience, 2023 - Wiley Online Library
Data privacy is critical for users who want to use Cloud storage services. There is a
significant focus on Cloud service providers to address this need. However, in the evolving …

[PDF][PDF] Pseudonym Mutable Based Privacy for 5G User Identity.

RA Saeed, MM Saeed, RA Mokhtar… - … Systems Science & …, 2021 - pdfs.semanticscholar.org
Privacy, identity preserving and integrity have become key problems for telecommunication
standards. Significant privacy threats are expected in 5G networks considering the large …

[HTML][HTML] EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT

S Li, J Wang, Y Wang, G Zhou, Y Zhao - Heliyon, 2023 - cell.com
The complexity of the Industrial Internet of Things (IIoT) presents higher requirements for
intrusion detection systems (IDSs). An adversarial attack is a threat to the security of …

A proactive method of the webshell detection and prevention based on deep traffic analysis

HV Le, HP Du, HN Nguyen… - … Journal of Web and …, 2022 - inderscienceonline.com
The popularity of today's web application has led to web servers frequently the objects of
webshell attacks. In this paper, we propose a new deep inspection method that is composed …

[HTML][HTML] RETRACTED ARTICLE: Fusion of transformer and ML-CNN-BiLSTM for network intrusion detection

Z Xiang, X Li - EURASIP journal on wireless communications and …, 2023 - Springer
Network intrusion detection system (NIDS) can effectively sense network attacks, which is of
great significance for maintaining the security of cyberspace. To meet the requirements of …

A Novel QoS‐Oriented Intrusion Detection Mechanism for IoT Applications

A Noorwali, AN Alvi, MZ Khan, MA Javed… - Wireless …, 2021 - Wiley Online Library
Wireless sensor network (WSN) is an integral part of Internet of Things (IoT). The sensor
nodes in WSN generate large sensing data which is disseminated to intelligent servers …

A trust-based malicious detection scheme for underwater acoustic sensor networks

K Liang, S Sun, X Huang, Q Yang… - … Conference on Artificial …, 2022 - Springer
Underwater acoustic sensor networks (UASNs) have been widely applied in the fields of
maritime and underwater industries and national defense. However, due to the unattended …

Research on Dynamic Monitoring of Train Running Part Using Integrated Detection System

S Wen, Q Ren, Y Shao, B Tang - International Conference on Adaptive …, 2022 - Springer
With the rapid development of the rail transit industry, the safety and reliability of train is a
prerequisite to ensure the development of rail transit technology. In train maintenance work …

Activation functions for deep learning: an application for rare attack detection in wireless local area network (WLAN)

VT Vu, TQB Thi, HS Gan, VV Vu, VT Duc… - 2023 25th …, 2023 - ieeexplore.ieee.org
As we know, there are now more and more cyberattacks that have a serious impact on
individuals, businesses, and governments. Attacks are increasingly sophisticated and …

Research on Method of Temperature Detection for Running Parts of Subway

L Huang, Y Zhang, Z Xing, Z Zhang, X Ye - International Conference on …, 2023 - Springer
The good condition of running parts in subway vehicles is the guarantee of safety operation
for the train. Among which the key components need to be checked are motor, axle box and …