Secure and dependable software defined networks

A Akhunzada, A Gani, NB Anuar, A Abdelaziz… - Journal of Network and …, 2016 - Elsevier
The revolutionary concept of Software Defined Networks (SDNs) potentially provides flexible
and well-managed next-generation networks. All the hype surrounding the SDNs is …

Sensor cloud frameworks: state-of-the-art, taxonomy, and research issues

RMA Haseeb-Ur-Rehman, M Liaqat… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
In recent times, Wireless Sensor Network (WSN) technology has received significant
attention owing to its numerous applications in various mission critical services, such as …

Information security policy compliance model in organizations

NS Safa, R Von Solms, S Furnell - computers & security, 2016 - Elsevier
The Internet and information technology have influenced human life significantly. However,
information security is still an important concern for both users and organizations …

Securing software defined networks: taxonomy, requirements, and open issues

A Akhunzada, E Ahmed, A Gani… - IEEE …, 2015 - ieeexplore.ieee.org
The emergence of SDNs promises to dramatically simplify network management and enable
innovation through network programmability. Despite all the hype surrounding SDNs …

Physical design obfuscation of hardware: A comprehensive investigation of device and logic-level techniques

A Vijayakumar, VC Patil, DE Holcomb… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
The threat of hardware reverse engineering is a growing concern for a large number of
applications. A main defense strategy against reverse engineering is hardware obfuscation …

A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme

S Barman, HPH Shum, S Chattopadhyay… - IEEE …, 2019 - ieeexplore.ieee.org
Smart card-based remote authentication schemes are widely used in multi-medical-server-
based telecare medicine information systems (TMISs). Biometric is one of the most …

Indirect effect of management support on users' compliance behaviour towards information security policies

N Humaidi, V Balakrishnan - Health Information …, 2018 - journals.sagepub.com
Background: Health information systems are innovative products designed to improve the
delivery of effective healthcare, but they are also vulnerable to breaches of information …

A tutorial on software obfuscation

S Banescu, A Pretschner - Advances in Computers, 2018 - Elsevier
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a
challenging security problem. The creator is an entity which can range from a single person …

A bilinear map pairing based authentication scheme for smart grid communications: Pauth

Y Chen, JF Martínez, P Castillejo, L López - IEEE Access, 2019 - ieeexplore.ieee.org
Smart meters have been widely applied in the smart grid, and they enable two-way
communication in the smart grid. User's electricity consumption data and other data are …

A Review on mobile application energy profiling: Taxonomy, state-of-the-art, and open research issues

RW Ahmad, A Gani, SHA Hamid, F Xia… - Journal of Network and …, 2015 - Elsevier
The shift of the information access paradigm to a mobile platform motivates research in
mobile application energy profiling to augment device battery lifetime. Energy profiling …