We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Robust Security Control Under Denial-of-service Jamming Attacks: An Event-triggered Sliding-mode Control Approach

    Robust security problem for uncertain cyber-physical systems (CPSs) subject to periodic denial-of-service (DoS) jamming attacks is investigated based...

    Bo-Chao Zheng, Lina Guo, ... Yangyang Zhao in International Journal of Control, Automation and Systems
    Article 03 November 2022
  2. Identification of Redundant Security Constraints in Robust SCUC Problems

    Security-constrained unit commitment (SCUC) is a fundamental problem in power systems and electricity markets. However, SCUC could be hard to solve...
    Conference paper 2023
  3. Robust JPEG steganography based on the robustness classifier

    Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular...

    Jimin Zhang, **anfeng Zhao, **aolei He in EURASIP Journal on Information Security
    Article Open access 11 December 2023
  4. Enhancing robustness and security of medical images through composite watermarking method

    With the expansion of IOTs and Wireless devices, data transmission has increased over the internet. Maintaining security during data transmission...

    Asmi Lakhani, Nimit Gupta, Ashima Anand in Soft Computing
    Article 09 January 2024
  5. Robust and efficient multi-level security framework for color medical images in telehealthcare services

    Recently, medical color images significantly affect the efficient diagnosis process and investigation of critical diseases besides mitigating the...

    Walid El-Shafai, Ezz El-Din Hemdan in Journal of Ambient Intelligence and Humanized Computing
    Article 15 September 2021
  6. Enhancing IoT security in wireless local area networks through dynamic vulnerability scanning

    Wireless local area networks (WLANs) play a crucial role in the internet of things (IoT) landscape, facilitating constant data exchange among...

    P SENTHILRAJA, P NANCY, ... G MANISHA in Sādhanā
    Article 06 June 2024
  7. Attack Detection and Security Control for UAVs Against Attacks on Desired Trajectory

    The paper presents a security control scheme for unmanned aerial vehicles (UAVs) against desired trajectory attacks. The key components of the...

    Kunpeng Pan, Yang Lyu, ... Quan Pan in Journal of Intelligent & Robotic Systems
    Article Open access 29 April 2024
  8. Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications

    In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine...

    T. Arpitha, Dharamendra Chouhan, J. Shreyas in Journal of Engineering and Applied Science
    Article Open access 03 January 2024
  9. 5G Security Threat Landscape, AI and Blockchain

    The convergence of Fifth Generation (5G) wireless technology and the Internet of Things (IoT) has ushered in a transformative era of enhanced...

    Mohammad N. Alanazi in Wireless Personal Communications
    Article 01 December 2023
  10. End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography

    In wireless sensor networks, ensuring data confidentiality and integrity is paramount, particularly in sensitive environments. However, existing...

    V. Anusuya Devi, T. Sampradeepraj in Wireless Personal Communications
    Article 25 June 2024
  11. Introducing robust reachability

    We introduce a new property called robust reachability which refines the standard notion of reachability in order to take replicability into account....

    Guillaume Girol, Benjamin Farinier, Sébastien Bardin in Formal Methods in System Design
    Article 21 November 2022
  12. Robust and Recovery Watermarking Approach Based on SVD and OTP Encryption

    Informed watermarking relates to a particular strategy in digital watermarking, a method utilized to embed data in multimedia content. There are...

    Article 01 June 2024
  13. Robust 3D Beamforming for Secure UAV Communications by DAE

    Unmanned aerial vehicles (UAVs) are considered to play vital roles in the Sixth Generation (6G) networks and beyond. However, the confidentiality of...

    Cuong Pham-Quoc, Vien Nguyen-Duy-Nhat, ... Nghia Nguyen-Xuan in Mobile Networks and Applications
    Article 24 May 2023
  14. Safeguarding IoT: Harnessing Practical Byzantine Fault Tolerance for Robust Security

    With the emergence of Internet of Things, massive amount of data is produced, processed, propagated, and stored each and everyday. These IoT devices...
    Nadiya Zafar, Ashish Khanna, ... Jameel Ahamed in Proceedings of Data Analytics and Management
    Conference paper 2024
  15. Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications

    There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and...

    Nasreen Fathima, Reshma Banu, G. F. Ali Ahammed in Wireless Personal Communications
    Article 08 March 2023
  16. Novel Security Metrics for Identifying Risky Unified Resource Locators (URLs)

    Attackers perform malicious activities by sending URL s to victims via e-mail, SMS , social network messages, and other means. Recently, intruders have...

    Article 10 May 2024
  17. A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor

    As Wireless Sensor Networks (WSN) uses the open channel for communication between the end users and the resource-constrained sensors; maintaining...

    Rituparna Paul, Shanvendra Rai, ... Preetisudha Meher in Peer-to-Peer Networking and Applications
    Article 22 December 2023
  18. Exploring the landscape of network security: a comparative analysis of attack detection strategies

    The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are...

    Article 05 May 2024
  19. Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection

    Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread...

    Chandra Prabha Kaliappan, Kanmani Palaniappan, ... Ushasukhanya Subramanian in Peer-to-Peer Networking and Applications
    Article 01 June 2024
  20. Performance Analysis of a Lightweight Robust Chaotic Image Re-encryption Scheme for 5G Heterogeneous Networks

    The 5G networks will require a paradigm shift in how they are constructed, managed and supervised for better data security performance. Driven by...

    Ajay Kakkar, Maninder Singh in Wireless Personal Communications
    Article 06 March 2023
Did you find what you were looking for? Share feedback.