Cybersecurity.springeropen.com
Intrusion detection in the internet of things
IoT Intrusion is defined as an unauthorised action or activity that harms the IoT ecosystem. In other words, an attack that results in any kind of damage to the confidentiality, integrity or … See more
Actived: 4 days ago
URL: https://cybersecurity.springeropen.com/articles/10.1186/s42400-021-00077-7
A decade of research on patterns and architectures for IoT security
WebWe give the definitions of SLR in the “Systematic literature review” section, (security) design patterns in the “Design pattern” section, and security architecture in the “Security architecture” section that were used to define the scope of this work. Systematic literature review. A SLR is a study that “reviews all the primary studies relating to a …
Evaluation indicators for open-source software: a review
WebIn recent years, the widespread applications of open-source software (OSS) have brought great convenience for software developers. However, it is always facing unavoidable security risks, such as open-source code defects and security vulnerabilities. To find out the OSS risks in time, we carry out an empirical study to identify the indicators …
Revocable and verifiable weighted attribute-based encryption with
WebThe encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a powerful encryption technique that offers flexible and fine-grained access control capabilities. Further, the multi-user collaborative access …
Cascading effects of cyber-attacks on interconnected critical
WebModern critical infrastructure, such as a water treatment plant, water distribution system, and power grid, are representative of Cyber Physical Systems (CPSs) in which the physical processes are monitored and controlled in real time. One source of complexity in such systems is due to the intra-system interactions and inter …
Survey of intrusion detection systems: techniques, datasets and
WebCyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and availability. Numerous intrusion detection methods have been proposed in the literature …
Access control technologies for Big Data management
WebData security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a reference data model and related data manipulation languages. In this paper, we focus on one of the key data security services, that is, access control, by highlighting the differences with traditional data …
Predicting individuals’ vulnerability to social engineering in social
WebThe popularity of social networking sites has attracted billions of users to engage and share their information on these networks. The vast amount of circulating data and information expose these networks to several security risks. Social engineering is one of the most common types of threat that may face social network users. Training and …
Inner product encryption from ring learning with errors
WebThe functional encryption scheme designed using the lattice can realize fine-grained encryption and it can resist quantum attacks. Unfortunately, the sizes of the keys and ciphertexts in cryptographic applications based on learning with errors are large, which makes the algorithm inefficient. Therefore, we construct a functional encryption for inner …
Articles Cybersecurity
WebStudy of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and transport. However, this increased …
Preparing your manuscript Cybersecurity
WebManuscripts should conform to the following reporting guidelines: Systematic Reviews and Meta-Analyses: PRISMA. Randomized Clinical Trials: CONSORT. Observational studies: STROBE. Studies of diagnostic accuracy: STARD. Animal pre-clinical studies: ARRIVE. Other types of health-related research: Consult the EQUATOR web site for appropriate
Top Categories
Popular Searched
› Kindred healthcare llc headquarters
› Healthcare services group w2 forms
› Allied health tools course catalog
› Liberty mutual health insurance ghana
› Cypress health center jones rd
› North dekalb board of health
› Harris health system insurance
› Desoto regional health mansfield
› Best fidelity health care funds
› Dekalb public health website
Recently Searched
› Hawaii health information exchange oahu
› Same day clinic harris health
› Healthiest mayonnaise on the market
› Baptist health gastro lexington ky
› United healthcare motion compatible trackers
› Ryman healthcare melbourne office
› Health first colorado fiscal agent dxc