UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

2 3 4 5 6
zadetkov: 76
31.
  • Analyzing the security of W... Analyzing the security of Windows 7 and Linux for cloud computing
    Salah, Khaled; Alcaraz Calero, Jose M.; Bernabé, Jorge Bernal ... Computers & security, 05/2013, Letnik: 34
    Journal Article
    Recenzirano

    We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the ...
Celotno besedilo
32.
  • Defining the Behavior of Io... Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions
    Hernandez-Ramos, Jose L.; Matheu, Sara N.; Feraudo, Angelo ... IEEE access, 2021, Letnik: 9
    Journal Article
    Recenzirano
    Odprti dostop

    With the strong development of the Internet of Things (IoT), the definition of IoT devices' intended behavior is key for an effective detection of potential cybersecurity attacks and threats in an ...
Celotno besedilo

PDF
33.
  • Research challenges in next... Research challenges in nextgen service orchestration
    Vaquero, Luis M.; Cuadrado, Felix; Elkhatib, Yehia ... Future generation computer systems, January 2019, 2019-01-00, Letnik: 90
    Journal Article
    Recenzirano
    Odprti dostop

    Fog/edge computing, function as a service, and programmable infrastructures, like software-defined networking or network function virtualisation, are becoming ubiquitously used in modern Information ...
Celotno besedilo

PDF
34.
  • TACIoT: multidimensional tr... TACIoT: multidimensional trust-aware access control system for the Internet of Things
    Bernal Bernabe, Jorge; Hernandez Ramos, Jose Luis; Skarmeta Gomez, Antonio F. Soft computing (Berlin, Germany), 05/2016, Letnik: 20, Številka: 5
    Journal Article
    Recenzirano

    Internet of Things environments are comprised of heterogeneous devices that are continuously exchanging information and being accessed ubiquitously through lossy networks. This drives the need of a ...
Celotno besedilo
35.
  • Automatic, verifiable and o... Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks
    Bringhenti, Daniele; Yusupov, Jalolliddin; Zarca, Alejandro Molina ... Computer networks (Amsterdam, Netherlands : 1999), 08/2022, Letnik: 213
    Journal Article
    Recenzirano

    The pervasiveness of Internet of Things (IoT) has made the management of computer networks more troublesome. The softwarized control provided by Software-Defined Networking (SDN) is not sufficient to ...
Celotno besedilo
36.
  • Taxonomy of trust relations... Taxonomy of trust relationships in authorization domains for cloud computing
    Marin Perez, Juan M.; Bernal Bernabe, Jorge; Alcaraz Calero, Jose M. ... The Journal of supercomputing, 12/2014, Letnik: 70, Številka: 3
    Journal Article
    Recenzirano

    Cloud computing is revealing a new scenario where different cloud customers need to collaborate to meet client demands. The cloud stack must be able to support this situation by enabling ...
Celotno besedilo
37.
  • Intrusion Detection Based o... Intrusion Detection Based on Privacy-Preserving Federated Learning for the Industrial IoT
    Ruzafa-Alcazar, Pedro; Fernandez-Saura, Pablo; Marmol-Campos, Enrique ... IEEE transactions on industrial informatics, 02/2023, Letnik: 19, Številka: 2
    Journal Article
    Odprti dostop

    Federated learning (FL) has attracted significant interest given its prominent advantages and applicability in many scenarios. However, it has been demonstrated that sharing updated gradients/weights ...
Celotno besedilo
38.
  • Distributed real-time SlowD... Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence
    Garcia, Norberto; Alcaniz, Tomas; González-Vidal, Aurora ... Journal of network and computer applications, 01/2021, Letnik: 173
    Journal Article
    Recenzirano

    SlowDoS attacks exploit slow transmissions on application-level protocols like HTTP to carry out denial of service against web-servers. These attacks are difficult to be detected with traditional ...
Celotno besedilo
39.
  • Enforcing Behavioral Profil... Enforcing Behavioral Profiles through Software-Defined Networks in the Industrial Internet of Things
    García, Sara Nieves Matheu; Molina Zarca, Alejandro; Hernández-Ramos, José Luis ... Applied sciences, 11/2019, Letnik: 9, Številka: 21
    Journal Article
    Recenzirano
    Odprti dostop

    The fourth industrial revolution is being mainly driven by the integration of Internet of Things (IoT) technologies to support the development lifecycle of systems and products. Despite the ...
Celotno besedilo

PDF
40.
  • Semantic-based authorizatio... Semantic-based authorization architecture for Grid
    Marín Pérez, Juan M.; Bernabé, Jorge Bernal; Alcaraz Calero, Jose M. ... Future generation computer systems, 2011, 2011-1-00, Letnik: 27, Številka: 1
    Journal Article
    Recenzirano

    There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization ...
Celotno besedilo
2 3 4 5 6
zadetkov: 76

Nalaganje filtrov