Search
Search Results
-
A formal security analysis of the fast authentication procedure based on the security context in 5G networks
The security context, generally stored in the universal subscriber identity module card or the baseband chip, is the critical information applied by...
-
Exploring the landscape of network security: a comparative analysis of attack detection strategies
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are...
-
Wireless 6G Cloud Communication Based Security Analysis Using Machine Learning in Internet of Medical Things (IoMT)
In order to safeguard confidentiality of patient data, healthcare data should not be made available to unauthorized individuals. By 2030, the...
-
Secrecy Capacity Analysis Using Nonlinear Transmissions for Physical Layer Security
In this paper, physical layer security is investigated, which is characterized by utilizing the physical layer characteristics to achieve secure...
-
EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration
Hardware information flow analysis detects security vulnerabilities resulting from microarchitectural design flaws, design-for-test/debug (DfT/D)...
-
Web Security Analysis of Banking Websites
Website security is the process of managing and securing a website from cyberattacks by taking essential measures. The main purpose of the paper is... -
Machine Learning-Based Security Evaluation and Overhead Analysis of Logic Locking
Piracy and overproduction of hardware intellectual properties are growing concerns for the semiconductor industry under the fabless paradigm....
-
IoT Data Stream Handling, Analysis, Communication and Security Issues: A Systematic Survey
Massive data management or data stream handling has become a prominent study topic as a result of recent breakthroughs in the Internet of Things...
-
Analysis of security and privacy issues in wearables for minors
The increased use of wearables in recent years has fostered a great technological development in this area, although without the appropriate...
-
Security Analysis of Drone Communication Methods
The use of drones in various applications has increased significantly in recent years, including agriculture, transportation, and military... -
Smart Cities and Transportation Based Vehicle-To-Vehicle Communication and Cyber Security Analysis Using Machine Learning Model in 6G Network
Increasing number of sensor-centric communication and computer equipment installed inside cars for various purposes, such as vehicle monitoring,...
-
Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network
Data security is based on the collection of data and storage without hacking from a third person has been proposed. While transmitting the data, the...
-
Threat analysis for space information network based on network security attributes: a review
Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is...
-
Computer network security and information security technology optimization by using Bayesian classification algorithm
The naive Bayesian classification algorithm is known for its perfect theoretical system, clear and simple star structure, good adaptability and high...
-
Intelligent LSTM (iLSTM)-Security Model for HetIoT
Distributed denial-of-service (DDoS) is the most recent lethal threat, and several industrial and academic researchers are concentrating on defending...
-
A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach
Internet of Things (IoT) applications are among the major trends of nowadays. Billions of connected devices are creating great business profits and...
-
Managing Pandemics in Airport Security Environments: A Comparative Analysis of Classic Airport Security and Smart Security Approaches
This article conducts a comparative analysis of conventional and SMART security systems within airport environments, focusing particularly on their... -
Smart City IoT System Network Level Routing Analysis and Blockchain Security Based Implementation
This paper demonstrates, network-level performance analysis and implementation of smart city Internet of Things (IoT) system with Infrastructure as a...
-
Security assessment and improvement of building ethernet KNXnet/IP protocol
KNXnet/IP is a KNX-building automation protocol that communicates through an IP network. It is mainly used in the field of smart home and building...
-
Physical layer security analysis of IRS-based downlink and uplink NOMA networks
In recent years, the development of intelligent reflecting surface (IRS) in wireless communications has enabled control of radio waves to reduce the...