The widespread use of remote sensing in asbestos, vegetation, oil and gas, and geology applications

LK Torres Gil, D Valdelamar Martínez, M Saba - Atmosphere, 2023 - mdpi.com
Remote sensing is the technique of acquiring data from the earth's surface from sensors
installed on satellites or on manned or unmanned aircrafts. Its use is common in dozens of …

DC-PUF: machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices

A Sajadi, A Shabani, B Alizadeh - Journal of Network and Computer …, 2023 - Elsevier
Abstract The Physical Unclonable Function (PUF) is a hardware block which exploits the
inherent process variations introduced during manufacturing to assign a unique fingerprint …

[PDF][PDF] Comprehensive Survey on AI-Based Technologies for Enhancing IoT Privacy and Security: Trends, Challenges, and Solutions

OEL Castro, X Deng, JH Park - HUMAN-CENTRIC COMPUTING AND …, 2023 - hcisj.com
Abstract The Internet of Things (IoT) is revolutionizing modern technology by connecting
numerous devices and applications. However, its lack of standardization has led to security …

Designing secure PUF-based authentication protocols for constrained environments

SW Lee, M Safkhani, Q Le, OH Ahmed… - Scientific Reports, 2023 - nature.com
Abstract Physical Unclonable Functions (PUFs) are widely used in cryptographic
authentication and key-agreement protocols due to their unique physical properties. This …

[PDF][PDF] Enhancing Security with Multi-Factor User Behavior Identification Via Longest Common Subsequence Analysis

B Shannaq, M Shakir - Informatica, 2024 - researchgate.net
Enter short title in File/Properties/Summary Page 1 https://doi.org/10.31449/inf.v48i19.6270
Informatica 48 (2024) 57–72 57 Enhancing Security with Multi-Factor User Behavior Identification …

Enhancing Security through Multi-Factor User Behavior Identification: Moving Beyond the Use of the Longest Common Subsequence (LCS)

B Shannaq, MT Shakir - Informatica, 2024 - informatica.si
The proposed approach comprises a set of strategies and tools to protect user-sensitive
data, such as passwords, from unauthorized access, misuse, or loss. It aims to identify …

Privacy-Enhanced Adaptive Authentication: User Profiling with Privacy Guarantees

Y Baseri, AS Hafid, D Makrakis - arXiv preprint arXiv:2410.20555, 2024 - arxiv.org
User profiling is a critical component of adaptive risk-based authentication, yet it raises
significant privacy concerns, particularly when handling sensitive data. Profiling involves …

Generating hash value at edge device using SRAM-PUF and autoencoder in IoT network

A Anand, JP Singh - Proceedings of the Indian National Science Academy, 2024 - Springer
With the deployment of the Internet of Things (IoT) networks, numerous IoT devices are
placed in remote and often untrusted locations, such as open or wild environments. The …

[PDF][PDF] Enhancing secure access through time-stamped password analysis: Implications for infrastructure and policy development

M Shakir, B Shannaq, O Ali… - Journal of Infrastructure …, 2024 - researchgate.net
The proposed research work encompasses implications for infrastructure particularly the
cybersecurity as an essential in soft infrastructure, and policy making particularly on secure …

[PDF][PDF] Asbesto en Colombia

G Villamizar, G Camero - … para el debate …, 2019 - repositorio.unicartagena.edu.co
Es Ingeniero Civil con Maestría en Estructuras y Doctorado cum laude en Ingeniería, énfasis
en Ciencia y Tecnología de Materiales. Actualmente es profesor de tiempo completo de la …