Cybersecurity.springeropen.com

Intrusion detection in the internet of things

IoT Intrusion is defined as an unauthorised action or activity that harms the IoT ecosystem. In other words, an attack that results in any kind of damage to the confidentiality, integrity or … See more

Actived: 4 days ago

URL: https://cybersecurity.springeropen.com/articles/10.1186/s42400-021-00077-7

A decade of research on patterns and architectures for IoT security

WebWe give the definitions of SLR in the “Systematic literature review” section, (security) design patterns in the “Design pattern” section, and security architecture in the “Security architecture” section that were used to define the scope of this work. Systematic literature review. A SLR is a study that “reviews all the primary studies relating to a …

Category:  Health Go Health

Evaluation indicators for open-source software: a review

WebIn recent years, the widespread applications of open-source software (OSS) have brought great convenience for software developers. However, it is always facing unavoidable security risks, such as open-source code defects and security vulnerabilities. To find out the OSS risks in time, we carry out an empirical study to identify the indicators …

Category:  Health Go Health

Revocable and verifiable weighted attribute-based encryption with

WebThe encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a powerful encryption technique that offers flexible and fine-grained access control capabilities. Further, the multi-user collaborative access …

Category:  Health Go Health

Cascading effects of cyber-attacks on interconnected critical

WebModern critical infrastructure, such as a water treatment plant, water distribution system, and power grid, are representative of Cyber Physical Systems (CPSs) in which the physical processes are monitored and controlled in real time. One source of complexity in such systems is due to the intra-system interactions and inter …

Category:  Health Go Health

Survey of intrusion detection systems: techniques, datasets and

WebCyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and availability. Numerous intrusion detection methods have been proposed in the literature …

Category:  Health Go Health

Access control technologies for Big Data management

WebData security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a reference data model and related data manipulation languages. In this paper, we focus on one of the key data security services, that is, access control, by highlighting the differences with traditional data …

Category:  Health Go Health

Predicting individuals’ vulnerability to social engineering in social

WebThe popularity of social networking sites has attracted billions of users to engage and share their information on these networks. The vast amount of circulating data and information expose these networks to several security risks. Social engineering is one of the most common types of threat that may face social network users. Training and …

Category:  Health Go Health

Inner product encryption from ring learning with errors

WebThe functional encryption scheme designed using the lattice can realize fine-grained encryption and it can resist quantum attacks. Unfortunately, the sizes of the keys and ciphertexts in cryptographic applications based on learning with errors are large, which makes the algorithm inefficient. Therefore, we construct a functional encryption for inner …

Category:  Health Go Health

Articles Cybersecurity

WebStudy of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and transport. However, this increased …

Category:  Health Go Health

Preparing your manuscript Cybersecurity

WebManuscripts should conform to the following reporting guidelines: Systematic Reviews and Meta-Analyses: PRISMA. Randomized Clinical Trials: CONSORT. Observational studies: STROBE. Studies of diagnostic accuracy: STARD. Animal pre-clinical studies: ARRIVE. Other types of health-related research: Consult the EQUATOR web site for appropriate

Category:  Health Go Health