-
Article
Open AccessA fog-edge-enabled intrusion detection system for smart grids
The Smart Grid (SG) heavily depends on the Advanced Metering Infrastructure (AMI) technology, which has shown its vulnerability to intrusions. To effectively monitor and raise alarms in response to anomalous a...
-
Chapter and Conference Paper
A Blockchain-Based Attack Detection Mechanism in Healthcare Cyber Physical Systems Against Jamming Attacks
Healthcare Cyber Physical Systems (CPS) are vulnerable to cyber risks due to their dependency on wireless communication. Due to its centralized safety features and limited security capabilities, CPS networks n...
-
Article
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing
With the emergence of COVID-19, smart healthcare, the Internet of Medical Things, and big data-driven medical applications have become even more important. The biomedical data produced is highly confidential a...
-
Chapter and Conference Paper
Match-the-Sound CAPTCHA
The ubiquity of the Internet has led to develop security measures to protect its services against abusive and malicious attacks. Most of the mercantile websites extensively use CAPTCHAs as a security measure a...