Designing a SHA-256 processor for blockchain-based IoT applications

R Martino, A Cilardo - Internet of Things, 2020 - Elsevier
An increasing number of Internet of Things applications have been recently considering the
use of the blockchain technology, calling for dedicated computational capabilities of the …

Systematic literature review of security pattern research

H Washizaki, T Xia, N Kamata, Y Fukazawa, H Kanuka… - Information, 2021 - mdpi.com
Security patterns encompass security-related issues in secure software system development
and operations that often appear in certain contexts. Since the late 1990s, about 500 …

Intent-driven secure system design: Methodology and implementation

SE Ooi, R Beuran, T Kuroda, T Kuwahara, R Hotchi… - Computers & …, 2023 - Elsevier
Given the typical complexity of networked systems in terms of number of components and
their interconnections, manually designing their architecture is inherently difficult, and the …

Cloud computing: developing contemporary computer science curriculum for a cloud-first future

D Foster, L White, J Adams, DC Erdil… - … Companion of the 23rd …, 2018 - dl.acm.org
Cloud Computing adoption has seen significant growth over the last five years. It offers a
diverse range of scalable and redundant service deployment models, including …

A blockchain based proposal for protecting healthcare systems through formal methods

L Brunese, F Mercaldo, A Reginelli… - Procedia Computer …, 2019 - Elsevier
Blockchain technology is one of the most important and disruptive technologies in the world.
Multiple industries are adopting the blockchain technology to innovate the way they work …

ACOp: an algorithm based on ant colony optimization for parking slot detection

W Balzano, S Stranieri - … and Network Applications: Proceedings of the …, 2019 - Springer
Abstract Ant Colony Optimization (ACO) is a known, largely employed paradigm for
optimization algorithm. It is a bio-inspired approach following the real world ants beahvior in …

Privacy preserving intrusion detection via homomorphic encryption

L Sgaglione, L Coppolino, S D'Antonio… - 2019 IEEE 28th …, 2019 - ieeexplore.ieee.org
In the recent years, we are assisting to an undiminished, and unlikely to stop number of
cyber threats, that have increased the organizations/companies interest about security …

Radiomic features for medical images tamper detection by equivalence checking

L Brunese, F Mercaldo, A Reginelli… - Procedia Computer …, 2019 - Elsevier
Digital medical images are very easy to be modified for illegal purposes. An attacker may
perform this act in order to stop a political candidate, sabotage research, commit insurance …

Secureweaver: Intent-driven secure system designer

SE Ooi, R Beuran, Y Tan, T Kuroda… - Proceedings of the …, 2022 - dl.acm.org
Design and management of networked systems, such as Information Technology/Network
(IT/NW) or IoT systems, are inherently complex. Moreover, the need to adhere to security …

A shared two-way cybersecurity model for enhancing cloud service sharing for distributed user applications

YD Al-Otaibi - ACM Transactions on Internet Technology (TOIT), 2021 - dl.acm.org
Cloud services provide decentralized and pervasive access for resources to reduce the
complex infrastructure requirements of the user. In decentralized service access, the …