NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 12
1.
Celotno besedilo

PDF
2.
  • IoT-KEEPER: Detecting Malic... IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge
    Hafeez, Ibbad; Antikainen, Markku; Ding, Aaron Yi ... IEEE eTransactions on network and service management, 2020-March, 2020-3-00, 20200301, Letnik: 17, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In addition, resource constraints and heterogeneity of IoT devices make it impractical to secure IoT ...
Celotno besedilo

PDF
3.
  • DNA-LCEB: a high-capacity a... DNA-LCEB: a high-capacity and mutation-resistant DNA data-hiding approach by employing encryption, error correcting codes, and hybrid twofold and fourfold codon-based strategy for synonymous substitution in amino acids
    Hafeez, Ibbad; Khan, Asifullah; Qadir, Abdul Medical & biological engineering & computing, 11/2014, Letnik: 52, Številka: 11
    Journal Article
    Recenzirano

    Data-hiding in deoxyribonucleic acid (DNA) sequences can be used to develop an organic memory and to track parent genes in an offspring as well as in genetically modified organism. However, the main ...
Celotno besedilo
4.
  • IoT Sentinel Demo: Automate... IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
    Miettinen, Markus; Frassetto, Tommaso; Sadeghi, Ahmad-Reza ... 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017-June
    Conference Proceeding

    The emergence of numerous new manufacturers producing devices for the Internet-of-Things (IoT) has given rise to new security concerns. Many IoT devices exhibit security flaws making them vulnerable ...
Celotno besedilo
5.
  • Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing
    Hafeez, Ibbad; Antikainen, Markku; Tarkoma, Sasu 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2019-March
    Conference Proceeding

    Traffic analysis attacks allow an attacker to infer sensitive information about users by analyzing network traffic of user devices. These attacks are passive in nature and are difficult to detect. In ...
Celotno besedilo
6.
  • Orchestrating Intelligent Network Operations in Programmable Networks
    Hatonen, Seppo; Hafeez, Ibbad; Mineraud, Julien ... 2021 IEEE Conference on Standards for Communications and Networking (CSCN), 2021-Dec.-15
    Conference Proceeding
    Odprti dostop

    Our communication networks have grown in size and have witnessed an influx of heterogeneous devices and their specialized device controllers. These devices include traditional computers, light-weight ...
Celotno besedilo

PDF
7.
  • Securing Edge Networks with Securebox
    Hafeez, Ibbad; Aaron Yi Ding; Tarkoma, Sasu arXiv (Cornell University), 12/2017
    Paper, Journal Article
    Odprti dostop

    The number of mobile and IoT devices connected to home and enterprise networks is growing fast. These devices offer new services and experiences for the users; however, they also present new classes ...
Celotno besedilo
8.
  • Poster: IoTURVA Poster: IoTURVA
    Hafeez, Ibbad; Ding, Aaron Yi; Antikainen, Markku ... Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 10/2017
    Conference Proceeding

    In this poster we present IoTurva, a platform for securing Device-to-Device (D2D) communication in IoT. Our solution takes a blackbox approach to secure IoT edge-networks. We combine user and ...
Celotno besedilo
9.
  • Demo Abstract: Securebox - A Platform to Safeguard Network Edge
    Hafeez, Ibbad; Ding, Aaron Yi; Suomalainen, Lauri ... 2016 IEEE/ACM Symposium on Edge Computing (SEC), 2016-Oct.
    Conference Proceeding

    The number of connected devices is increasing exponentially, which has made the job of managing and securing networks more complex and demanding than ever before. In this paper, we present a novel ...
Celotno besedilo
10.
  • IoT-KEEPER: Securing IoT Communications in Edge Networks
    Hafeez, Ibbad; Antikainen, Markku; Aaron Yi Ding ... arXiv (Cornell University), 10/2018
    Paper, Journal Article
    Odprti dostop

    The increased popularity of IoT devices have made them lucrative targets for attackers. Due to insecure product development practices, these devices are often vulnerable even to very trivial attacks ...
Celotno besedilo
1 2
zadetkov: 12

Nalaganje filtrov