[HTML][HTML] Security engineering of patient-centered health care information systems in peer-to-peer environments: systematic review

I Abdullahi Yari, T Dehling, F Kluge, J Geck… - Journal of Medical …, 2021 - jmir.org
Background Patient-centered health care information systems (PHSs) enable patients to
take control and become knowledgeable about their own health, preferably in a secure …

Survey of network coding based P2P file sharing in large scale networks

AA AbuDaqa, A Mahmoud, M Abu-Amara, T Sheltami - Applied Sciences, 2020 - mdpi.com
Peer-to-peer (P2P) content distribution and file sharing systems aim to facilitate the
dissemination of large files over unreliable networks. Network coding is a transmission …

[PDF][PDF] Resource exhaustion attack detection scheme for wlan using artificial neural network

AE Abdallah, M Hamdan, S Abd Razak… - Comput. Mater …, 2023 - eprints.utm.my
IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to
vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the …

[HTML][HTML] Building a trust model system to avoid cloud services reputation attacks

ST Alshammari, A Albeshri, K Alsubhi - Egyptian Informatics Journal, 2021 - Elsevier
The safety of cloud services within a Trust Model System (TMS) is certainly compromised by
a lack of defense against security threats as well as by inaccuracy of the trust results. Our …

Trust prediction for online social networks with integrated time-aware similarity

X Gao, W Xu, M Liao, G Chen - ACM Transactions on Knowledge …, 2021 - dl.acm.org
Online social networks gain increasing popularity in recent years. In online social networks,
trust prediction is significant for recommendations of high reputation users as well as in …

Provisioning, authentication and secure communications for IoT devices on FIWARE

PR Sousa, L Magalhães, JS Resende, R Martins… - Sensors, 2021 - mdpi.com
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of
cyberattacks in all of its facets. One of the most predominant attack vectors is related to its …

Building a reputation attack detector for effective trust evaluation in a cloud services environment

ST Alshammari, K Alsubhi - Applied Sciences, 2021 - mdpi.com
Cloud computing is a widely used technology that has changed the way people and
organizations store and access information. This technology is versatile, and extensive …

Security and fairness in IoT based e-Health system: A case study of mobile edge-clouds

FN Nwebonyi, R Martins… - … Conference on Wireless …, 2019 - ieeexplore.ieee.org
Through IoT, humans and objects can be connected seamlessly, to guaranty improved
quality of service (QoS). IoT-driven e-Health systems benefit from such rich network setting …

The data transaction reputation evaluation model based on evaluation entity

B Zhao, L Cao, Y Gao - The Journal of Supercomputing, 2024 - Springer
Aiming at the problem of imprecise reputation evaluation caused by too much subjective and
qualitative evaluation of the traditional reputation evaluation model in data transactions, An …

Analysis of minimum distribution time of two-class tit-for-tat-based P2P file distribution

M Sasabe, M Kiyomitsu - Computer Networks, 2022 - Elsevier
The demand for large-scale file distribution over the Internet has been increasing, such as
software and its update data distribution. When a new and/or popular file is released, many …