K Xia, S Wei - 2023 Asian Hardware Oriented Security and …, 2023 - ieeexplore.ieee.org
Multi-FPGA systems have recently been deployed in modern data centers to accelerate large-scale, computation-intensive cloud applications. Meanwhile, recent studies promote …
In smartphones, and more generally in IoT devices, manufacturers focus their efforts on securing communications with the outside world that are more exposed to attack while …
M Ibrahim, R Elhafiz, A Al-Wadi - IEEE Transactions on Industry …, 2023 - ieeexplore.ieee.org
Automation frequently needs less human engagement, encouraging reliance on continually operating machinery and automated processes that perform a range of functions. The …
G Narula, P Nagrath, D Hans… - Cyber‐Physical Systems …, 2022 - Wiley Online Library
Cyber security is now a global and heated debate. Man‐in‐the‐Middle Attack is a type of cyber‐attack in which an unauthorized person enters the online network between the two …
Our perception of reality is under constant threat from ever-improving video manipulation techniques, including deep-fakes and generative AI. Therefore, proving authenticity of …
Hardware security becomes a major concern for the development of future IoT devices. In this paper, we propose to investigate traffic monitoring for a low-cost real-time anomaly …
M Ibrahim, A Al-Wadi - Information, 2022 - mdpi.com
In general, automation involves less human intervention, which leads to dependence on preprogrammed machines and processes that operate continually and carry out numerous …
R Avanzi, I Mihalcea, D Schall, H Montaner… - Cryptology ePrint …, 2022 - eprint.iacr.org
Confidential Computing is the protection of data in use from access or modification by any unauthorized agent, including privileged software. For example, in Intel SGX (Client and …
S Ul-Aaish, IM Pires, A Godinho… - 2024 11th …, 2024 - ieeexplore.ieee.org
This research investigates the impact of Man-In-The-Middle (MITM) attacks on network environments, mainly clients, due to a lack of advanced security measures. The study uses a …