An investigation on cyber security threats and security models

K Thakur, M Qiu, K Gai, ML Ali - 2015 IEEE 2nd international …, 2015 - ieeexplore.ieee.org
Cyber security has been used interchangeably for information security, where later
considers the role of the human in the security process while former consider this as an …

Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

FLOWGUARD: Building robust firewalls for software-defined networks

H Hu, W Han, GJ Ahn, Z Zhao - Proceedings of the third workshop on Hot …, 2014 - dl.acm.org
Software-Defined Networking (SDN) introduces significant granularity, visibility and flexibility
to networking, but at the same time brings forth new security challenges. One of the …

[PDF][PDF] Flexible and fine-grained mandatory access control on android for diverse security and privacy policies.

S Bugiel, S Heuser, AR Sadeghi - USENIX Security Symposium, 2013 - usenix.org
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …

Policy-driven security management for fog computing: Preliminary framework and a case study

C Dsouza, GJ Ahn, M Taguinod - Proceedings of the 2014 IEEE …, 2014 - ieeexplore.ieee.org
With the increasing user demand for elastic provisioning of resources coupled with
ubiquitous and on-demand access to data, cloud computing has been recognized as an …

Multiparty access control for online social networks: model and mechanisms

H Hu, GJ Ahn, J Jorgensen - IEEE Transactions on Knowledge …, 2012 - ieeexplore.ieee.org
Online social networks (OSNs) have experienced tremendous growth in recent years and
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …

Machine learning for anomaly detection and categorization in multi-cloud environments

T Salman, D Bhamare, A Erbad, R Jain… - 2017 IEEE 4th …, 2017 - ieeexplore.ieee.org
Cloud computing has been widely adopted by application service providers (ASPs) and
enterprises to reduce both capital expenditures (CAPEX) and operational expenditures …

Methods and systems for improving analytics in distributed networks

CY Shieh, TWF Chou - US Patent 10,193,929, 2019 - Google Patents
Abstract Systems and methods for improving analytics in a distributed network are described
herein. An example system includes at least one processor, an analytics module, and a …

Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection

R Panigrahi, S Borah, M Pramanik, AK Bhoi… - Computer …, 2022 - Elsevier
Researchers are motivated to build effective Intrusion Detection Systems because of the
implications of malicious actions in computing, communication, and cyber–physical systems …

LPM: Layered policy management for software-defined networks

W Han, H Hu, GJ Ahn - Data and Applications Security and Privacy XXVIII …, 2014 - Springer
Abstract Software-Defined Networking (SDN) as an emerging paradigm in networking
divides the network architecture into three distinct layers such as application, control, and …