DIKUL - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 1,159
1.
  • Cryptographic Solutions for... Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities
    Choo, Kim-Kwang Raymond; Gritzalis, Stefanos; Park, Jong Hyuk IEEE transactions on industrial informatics, 08/2018, Volume: 14, Issue: 8
    Journal Article

    Industrial Internet of Things (IIoT) is an emerging trend, including in nontraditional technological sector (e.g., oil and gas industry). There are, however, a number of research challenges such ...
Full text
Available for: UL
2.
  • Blockchain-Based Anonymous ... Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure
    Wang, Jing; Wu, Libing; Choo, Kim-Kwang Raymond ... IEEE transactions on industrial informatics, 03/2020, Volume: 16, Issue: 3
    Journal Article
    Open access

    Achieving low latency and providing real-time services are two of several key challenges in conventional cloud-based smart grid systems, and hence, there has been an increasing trend of moving to ...
Full text
Available for: UL

PDF
3.
  • Blockchain in healthcare ap... Blockchain in healthcare applications: Research challenges and opportunities
    McGhin, Thomas; Choo, Kim-Kwang Raymond; Liu, Charles Zhechao ... Journal of network and computer applications, 06/2019, Volume: 135
    Journal Article
    Peer reviewed

    Blockchain has a range of built-in features, such as distributed ledger, decentralized storage, authentication, security, and immutability, and has moved beyond hype to practical applications in ...
Full text
Available for: UL
4.
  • A Deep Blockchain Framework... A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
    Alkadi, Osama; Moustafa, Nour; Turnbull, Benjamin ... IEEE internet of things journal, 06/2021, Volume: 8, Issue: 12
    Journal Article

    There has been significant research in incorporating both blockchain and intrusion detection to improve data privacy and detect existing and emerging cyberattacks, respectively. In these approaches, ...
Full text
Available for: UL
5.
  • An Ensemble Intrusion Detec... An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things
    Moustafa, Nour; Turnbull, Benjamin; Choo, Kim-Kwang Raymond IEEE internet of things journal, 06/2019, Volume: 6, Issue: 3
    Journal Article

    Internet of Things (IoT) plays an increasingly significant role in our daily activities, connecting physical objects around us into digital services. In other words, IoT is the driving force behind ...
Full text
Available for: UL
6.
  • Robust Malware Detection fo... Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
    Azmoodeh, Amin; Dehghantanha, Ali; Choo, Kim-Kwang Raymond IEEE transactions on sustainable computing, 2019-Jan.-March-1, 2019-1-1, 20190101, Volume: 4, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-connected devices and nodes (e.g., medical devices and wearable combat uniforms). These IoT devices and ...
Full text
Available for: UL

PDF
7.
  • Machine learning aided Andr... Machine learning aided Android malware classification
    Milosevic, Nikola; Dehghantanha, Ali; Choo, Kim-Kwang Raymond Computers & electrical engineering, July 2017, 2017-07-00, 20170701, Volume: 61
    Journal Article
    Peer reviewed
    Open access

    •Machine learning aided Android malware classification.•OWASP Seraphimdroid Android app.•Source code analysis utilizing a bag-of-words representation model.•Android file decompiling and machine ...
Full text
Available for: UL

PDF
8.
  • Authenticated key agreement... Authenticated key agreement scheme for fog-driven IoT healthcare system
    Jia, Xiaoying; He, Debiao; Kumar, Neeraj ... Wireless networks, 11/2019, Volume: 25, Issue: 8
    Journal Article
    Peer reviewed

    The convergence of cloud computing and Internet of Things (IoT) is partially due to the pragmatic need for delivering extended services to a broader user base in diverse situations. However, cloud ...
Full text
Available for: CEKLJ, UL
9.
  • A Two-Layer Dimension Reduc... A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
    Pajouh, Hamed Haddad; Javidan, Reza; Khayami, Raouf ... IEEE transactions on emerging topics in computing, 04/2019, Volume: 7, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network ...
Full text
Available for: UL

PDF
10.
  • Blockchain Applications for... Blockchain Applications for Industry 4.0 and Industrial IoT: A Review
    Alladi, Tejasvi; Chamola, Vinay; Parizi, Reza M. ... IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    The potential of blockchain has been extensively discussed in the literature and media mainly in finance and payment industry. One relatively recent trend is at the enterprise-level, where blockchain ...
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 1,159

Load filters