Attention-based multidimensional deep learning approach for cross-architecture IoMT malware detection and classification in healthcare cyber-physical systems

V Ravi, TD Pham, M Alazab - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
A literature survey shows that the number of malware attacks is gradually growing over the
years due to the growing trend of Internet of Medical Things (IoMT) devices. To detect and …

An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy

KK Singamaneni, AK Budati, T Bikku - Wireless Personal Communications, 2024 - Springer
Abstract The Key Policy Attribute-based Encryption (KPABE) standard arises as the utmost
appropriate security system for public key encipherment. KP-ABE has been extensively …

Internet of things based smart city design using fog computing and fuzzy logic

KK Bhardwaj, S Banyal, DK Sharma… - Sustainable Cities and …, 2022 - Elsevier
The prevalence of IoT based technology in contemporary society allows for the planning of
smart city infrastructure with individually owned devices as participating nodes in a social …

The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

Energy and task completion time minimization algorithm for UAVs-empowered MEC SYSTEM

M Asim, WK Mashwani, AA Abd El-Latif - … Computing: Informatics and …, 2022 - Elsevier
This paper presents an energy and task completion time minimization scheme for the
unmanned aerial vehicles (UAVs)-empowered mobile edge computing (MEC) system …

LEOBAT: Lightweight encryption and OTP based authentication technique for securing IoT networks

A Goel, DK Sharma, KD Gupta - Expert Systems, 2022 - Wiley Online Library
Authentication is one of the foremost pillars in the Internet of Things (IoT) security that
authenticates the identity of a device or a person with the help of a unique identification …

[HTML][HTML] Self secured model for cloud based IOT systems

GS Priyatharsini, AJ Babu, MG Kiran, PJS Kumar… - Measurement …, 2022 - Elsevier
A difficult problem to solve concerns the secure installation and startup of devices connected
to the Internet of Things (IoT) via the Internet. To provide additional value-added services …

[HTML][HTML] A data plane security model of segmented routing based on SDP trust enhancement architecture

L Wang, H Ma, Y Jiang, Y Tang, S Zu, T Hu - Scientific Reports, 2022 - nature.com
Segment routing (SR) technology is a new network functional technology derived from
MPLS technology and based on SDN. Combining SR with software-defined perimeter …

Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches

X Chen, H Liu, Q Huang, D Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Due to limited memory usage and provably high accuracy, sketches running on
programmable switches have been commonly used by the literature for network …

A Secure Remote Monitoring as a Service (MaaS) for Solar Power Plant

CS Priya, J Thangakumar… - … on Networking and …, 2023 - ieeexplore.ieee.org
In the field of Renewable energy, data processing is occurring in the photovoltaic plant using
the IoT data logger. A data logger is a piece of technology that records and stores data over …