UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 130
1.
  • Lightweight Cryptographic P... Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey
    Khan, Muhammad Nauman; Rao, Asha; Camtepe, Seyit IEEE internet of things journal, 03/2021, Volume: 8, Issue: 6
    Journal Article

    Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber and physical worlds. IoT technology finds applications in a broad spectrum of areas such as homes, health, ...
Full text
2.
  • Combinatorial Design of Key... Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
    Camtepe, S.A.; Yener, B. IEEE/ACM transactions on networking, 04/2007, Volume: 15, Issue: 2
    Journal Article
    Peer reviewed

    Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no ...
Full text
3.
  • A Survey on Cyber Situation... A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights
    Alavizadeh, Hooman; Jang-Jaccard, Julian; Enoch, Simon Yusuf ... ACM computing surveys, 12/2022, Volume: 55, Issue: 5
    Journal Article
    Peer reviewed

    Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats that are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered ...
Full text
4.
  • AE-MLP: A Hybrid Deep Learn... AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification
    Wei, Yuanyuan; Jang-Jaccard, Julian; Sabrina, Fariza ... IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    Distributed Denial-of-Service (DDoS) attacks are increasing as the demand for Internet connectivity massively grows in recent years. Conventional shallow machine learning-based techniques for DDoS ...
Full text

PDF
5.
  • Stochastic Modeling of IoT ... Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling
    Mahboubi, Arash; Camtepe, Seyit; Ansari, Keyvan IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    The Internet of Things (IoT) devices are being widely deployed and have been targeted and victimized by malware attacks. The mathematical modelling for an accurate prediction of malicious spreads of ...
Full text

PDF
6.
  • Evaluation of Federated Lea... Evaluation of Federated Learning in Phishing Email Detection
    Thapa, Chandra; Tang, Jun Wen; Abuadbba, Alsharif ... Sensors (Basel, Switzerland), 04/2023, Volume: 23, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    The use of artificial intelligence (AI) to detect phishing emails is primarily dependent on large-scale centralized datasets, which has opened it up to a myriad of privacy, trust, and legal issues. ...
Full text
7.
  • Precision health data: Requ... Precision health data: Requirements, challenges and existing techniques for data security and privacy
    Thapa, Chandra; Camtepe, Seyit Computers in Biology and Medicine, February 2021, 2021-Feb, 2021-02-00, 20210201, Volume: 129
    Journal Article
    Peer reviewed
    Open access

    Precision health leverages information from various sources, including omics, lifestyle, environment, social media, medical records, and medical insurance claims to enable personalized care, prevent ...
Full text

PDF
8.
  • The Compression Optimality ... The Compression Optimality of Asymmetric Numeral Systems
    Pieprzyk, Josef; Duda, Jarek; Pawłowski, Marcin ... Entropy (Basel, Switzerland), 04/2023, Volume: 25, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Source coding has a rich and long history. However, a recent explosion of multimedia Internet applications (such as teleconferencing and video streaming, for instance) renews interest in fast ...
Full text
9.
  • Efficient Route Update and ... Efficient Route Update and Maintenance for Reliable Routing in Large-Scale Sensor Networks
    Pradittasnee, Lapas; Camtepe, Seyit; Yu-Chu Tian IEEE transactions on industrial informatics, 02/2017, Volume: 13, Issue: 1
    Journal Article
    Open access

    Reliable data transmissions are challenging in industrial wireless sensor networks as channel conditions change over time. Rapid changes in channel conditions require accurate estimation of the ...
Full text
10.
  • A Study on Formal Methods t... A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts
    Mahboubi, Arash; Camtepe, Seyit; Morarji, Hasmukh IEEE access, 01/2017, Volume: 5
    Journal Article
    Peer reviewed
    Open access

    Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has ...
Full text

PDF
1 2 3 4 5
hits: 130

Load filters