![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessSPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems
Smart healthcare systems promise significant benefits for fast and accurate medical decisions. However, working with personal health data presents new privacy issues and constraints that must be solved from a ...
-
Article
A threat intelligence framework for protecting smart satellite-based healthcare networks
Human-to-machine (H2M) communication is an important evolution in the industrial internet of health things (IIoHT), where many H2M interfaces are remotely interacting with industrial and medical assets. Lightw...
-
Article
Open AccessAn improved Henry gas optimization algorithm for joint mining decision and resource allocation in a MEC-enabled blockchain networks
This paper investigates a wireless blockchain network with mobile edge computing in which Internet of Things (IoT) devices can behave as blockchain users (BUs). This blockchain network’s ultimate goal is to in...
-
Article
Open AccessCyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection
The uses of machine learning (ML) technologies in the detection of network attacks have been proven to be effective when designed and evaluated using data samples originating from the same organisational netwo...
-
Chapter and Conference Paper
NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems
Machine Learning (ML)-based Network Intrusion Detection Systems (NIDSs) have become a promising tool to protect networks against cyberattacks. A wide range of datasets are publicly available and have been used...
-
Chapter and Conference Paper
Correction to: A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems
The original version of this chapter was revised. The following corrections have been incorporated:
-
Reference Work Entry In depth
Security and Privacy in 4G/LTE Network
-
Chapter and Conference Paper
A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems
Smart power grids suffer from coordinated attacks that exploit both their physical and cyber layers. It is an inevitable requirement to study power systems under such complex hacking scenarios to discover the ...
-
Chapter and Conference Paper
Probability Risk Identification Based Intrusion Detection System for SCADA Systems
As Supervisory Control and Data Acquisition (SCADA) systems control several critical infrastructures, they have connected to the internet. Consequently, SCADA systems face different sophisticated types of cybe...
-
Living Reference Work Entry In depth
Security and Privacy in 4G/LTE Network
-
Chapter and Conference Paper
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning
The protection of operating systems from the current cyber threats has paramount importance. This importance is reflected by the functional dependency of any known or unknown cyber-attack upon the machines ope...
-
Chapter and Conference Paper
A Network Forensic Scheme Using Correntropy-Variation for Attack Detection
Network forensic techniques help track cyber attacks by monitoring and analyzing network traffic. However, due to the large volumes of data in modern networks and sophisticated attacks that mimic normal behavi...
-
Chapter and Conference Paper
Towards Develo** Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques
The IoT is a network of interconnected everyday objects called “things” that have been augmented with a small measure of computing capabilities. Lately, the IoT has been affected by a variety of different botn...
-
Chapter
Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models
An intrusion detection system has become a vital mechanism to detect a wide variety of malicious activities in the cyber domain. However, this system still faces an important limitation when it comes to detect...