Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey

V Sharma, I You, K Andersson, F Palmieri… - IEEE …, 2020 - ieeexplore.ieee.org
With an enormous range of applications, the Internet of Things (IoT) has magnetized
industries and academicians from everywhere. IoT facilitates operations through ubiquitous …

Review of some recent european cybersecurity research and innovation projects

M Çağlayan - Infocommunications Journal, 2022 - avesis.yasar.edu.tr
This paper reviews research from several EU Projects that have addressed cybersecurity
using techniques based on Machine Learning, including the security of Mobile Networks …

[PDF][PDF] 面向分层无人机网络的去中心群组密钥管理方案

姜奇, 蔡明鑫, 程庆丰, 田有亮, 马建峰 - 电子与信息学报, 2023 - jeit.ac.cn
为解决现有分层无人机(UAV) 网络中群组密钥管理存在的单点故障问题, 群组成员离线导致整个
群组无法计算, 及时更新组密钥的问题, 该文提出一种支持异步计算的去中心群组密钥管理方案 …

European cybersecurity research and the seriot project

J Domańska, M Nowak, S Nowak… - … 2018, Held at the 24th IFIP …, 2018 - Springer
This paper briefly reviews some recent research in Cybersecurity in Europe funded by the
European Commission in areas such as mobile telephony, networked health systems, the …

Dynamic group key agreement for resource-constrained devices using blockchains

YB Taçyıldız, O Ermiş, G Gür, F Alagöz - … Rome, Italy, October 19–22, 2020 …, 2020 - Springer
Dynamic group key agreement (DGKA) protocols are one of the key security primitives to
secure multiparty communications in decentralized and insecure environments while …

Decentralized group key management scheme in hierarchical unmanned aerial vehicle network

Q JIANG, M CAI, Q CHENG, Y TIAN, J MA - 电子与信息学报, 2023 - jeit.ac.cn
To address the single point failure of group key management in the existing hierarchical
Unmanned Aerial Vehicle (UAV) network, and the incapability of timely group key …

AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results

MU Çag̃layan - International ISCIS Security Workshop, 2021 - Springer
This article summarizes briefly the contributions presented in this EuroCyberSecurity
Workshop 2021 which is organized as part of the series of International Symposia on …

Some current cybersecurity research in Europe

MU Çag̃layan - Security in Computer and Information Sciences: First …, 2018 - Springer
We present a brief summary of the papers that were presented at the Security Workshop
2018 of the International Symposium on Computer and Information Sciences (ISCIS) that …

A Novel Key Agreement Protocol Based on RET Gadget Chains for Preventing Reused Code Attacks

W Fusheng, Z Huanguo, N Mingtao, W Jun… - IEEE …, 2018 - ieeexplore.ieee.org
Attackers exploit vulnerabilities to change RET gadget chains and control the order of
program execution, threatening the security of software implementations. For example …

A survey on group key agreement protocols in cloud environment

M Li, R Zhang, X Du, M Zhou, L Yan… - 2018 1st International …, 2018 - ieeexplore.ieee.org
This survey is aimed at reviewing the group key agreement protocols in cloud environment.
These protocols are given a classification, which are group key agreement protocol, triple …