Search
Search Results
-
Robust Security Control Under Denial-of-service Jamming Attacks: An Event-triggered Sliding-mode Control Approach
Robust security problem for uncertain cyber-physical systems (CPSs) subject to periodic denial-of-service (DoS) jamming attacks is investigated based...
-
Identification of Redundant Security Constraints in Robust SCUC Problems
Security-constrained unit commitment (SCUC) is a fundamental problem in power systems and electricity markets. However, SCUC could be hard to solve... -
Robust JPEG steganography based on the robustness classifier
Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular...
-
Enhancing robustness and security of medical images through composite watermarking method
With the expansion of IOTs and Wireless devices, data transmission has increased over the internet. Maintaining security during data transmission...
-
Robust and efficient multi-level security framework for color medical images in telehealthcare services
Recently, medical color images significantly affect the efficient diagnosis process and investigation of critical diseases besides mitigating the...
-
Enhancing IoT security in wireless local area networks through dynamic vulnerability scanning
Wireless local area networks (WLANs) play a crucial role in the internet of things (IoT) landscape, facilitating constant data exchange among...
-
Attack Detection and Security Control for UAVs Against Attacks on Desired Trajectory
The paper presents a security control scheme for unmanned aerial vehicles (UAVs) against desired trajectory attacks. The key components of the...
-
Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine...
-
5G Security Threat Landscape, AI and Blockchain
The convergence of Fifth Generation (5G) wireless technology and the Internet of Things (IoT) has ushered in a transformative era of enhanced...
-
End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography
In wireless sensor networks, ensuring data confidentiality and integrity is paramount, particularly in sensitive environments. However, existing...
-
Introducing robust reachability
We introduce a new property called robust reachability which refines the standard notion of reachability in order to take replicability into account....
-
Robust and Recovery Watermarking Approach Based on SVD and OTP Encryption
Informed watermarking relates to a particular strategy in digital watermarking, a method utilized to embed data in multimedia content. There are...
-
Robust 3D Beamforming for Secure UAV Communications by DAE
Unmanned aerial vehicles (UAVs) are considered to play vital roles in the Sixth Generation (6G) networks and beyond. However, the confidentiality of...
-
Safeguarding IoT: Harnessing Practical Byzantine Fault Tolerance for Robust Security
With the emergence of Internet of Things, massive amount of data is produced, processed, propagated, and stored each and everyday. These IoT devices... -
Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications
There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and...
-
Novel Security Metrics for Identifying Risky Unified Resource Locators (URLs)
Attackers perform malicious activities by sending URL s to victims via e-mail, SMS , social network messages, and other means. Recently, intruders have...
-
A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor
As Wireless Sensor Networks (WSN) uses the open channel for communication between the end users and the resource-constrained sensors; maintaining...
-
Exploring the landscape of network security: a comparative analysis of attack detection strategies
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are...
-
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection
Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread...
-
Performance Analysis of a Lightweight Robust Chaotic Image Re-encryption Scheme for 5G Heterogeneous Networks
The 5G networks will require a paradigm shift in how they are constructed, managed and supervised for better data security performance. Driven by...