Filters








5,075 Hits in 6.0 sec

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

Shapla Khanam, Ismail Bin Ahmedy, Mohd Yamani Idna Idris, Mohamed Hisham Jaward, Aznul Qalid Bin Md Sabri
2020 IEEE Access  
To achieve a secure communication for IoT, the following security principles should be considered. 1) LIGHTWEIGHT SOLUTIONS Lightweight security solutions can be introduced as a unique feature since  ...  However, more research works are still needed to improve hybrid security schemes to be a more lightweight and stronger solution at the same time.  ... 
doi:10.1109/access.2020.3037359 fatcat:pw4fsmelmjgc5anm7hp537l63e

Quantum Computing: A Taxonomy, Systematic Review and Future Directions [article]

Sukhpal Singh Gill, Adarsh Kumar, Harvinder Singh, Manmeet Singh, Kamalpreet Kaur, Muhammad Usman, Rajkumar Buyya
2021 arXiv   pre-print
Quantum computing is an emerging paradigm with the potential to offer significant computational advantage over conventional classical computing by exploiting quantum-mechanical principles such as entanglement  ...  A detailed overview of quantum software tools and technologies, post-quantum cryptography and quantum computer hardware development to document the current state-of-the-art in the respective areas.  ...  The concept of the Quantum bits (Q-bit) and Quantum gates (Q-gate) have been applied enabling the algorithm to reach out to an optimal solution.  ... 
arXiv:2010.15559v4 fatcat:y6cuttww5fd5jdmvcer352lh4e

A Survey on Cloud Attack Detection using Machine Learning Techniques

Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkarvarthy
2020 International Journal of Computer Applications  
This survey provides a comprehensive study of cloud security concerns, traditional security measures, and machine learning-based security solutions in the cloud environment.  ...  Machine learning techniques play a significant role in automatically discovering the potential difference between legitimate and malicious data with high accuracy.  ...  potential solutions for cloud security.  ... 
doi:10.5120/ijca2020920887 fatcat:5kk66mrxcffhnajfovglapfasu

Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey

Zawar Shah, Imdad Ullah, Huiling Li, Andrew Levula, Khawar Khurshid
2022 Sensors  
However, Distributed Denial of Service (DDoS) attacks pose a serious threat to the security of IoT.  ...  As an emerging technology, Blockchain has the potential to solve the security issues in IoT. Therefore, it is important to analyse various Blockchain-based solutions to mitigate DDoS attacks in IoT.  ...  Conflicts of Interest: The authors do not declare any conflict of interests.  ... 
doi:10.3390/s22031094 pmid:35161838 pmcid:PMC8840306 fatcat:qqhqoltk35ertd3zv3boezjms4

On the impact of quantum computing technology on future developments in high-performance scientific computing

Matthias Möller, Cornelis Vuik
2017 Ethics and Information Technology  
Building a quantum computer that can be used practically is in itself an outstanding challenge that has become the 'new race to the moon'.  ...  We thereby assume that quantum computers will form part of a hybrid accelerated computing platform like GPUs and co-processor cards do today.  ...  A secure solution of the key exchange problem is quantum key distribution. Recently DLR has done a number of successful experiments to transmit a quantum key from a fast-moving object.  ... 
doi:10.1007/s10676-017-9438-0 fatcat:24xndp2mj5gazmdcphgbpbgtme

A taxonomy on misbehaving nodes in delay tolerant networks

Waqar Khalid, Zahid Ullah, Naveed Ahmed, Yue Cao, Muhammad Khalid, Muhammad Arshad, Farhan Ahmad, Haitham Cruickshank
2018 Computers & security  
The focus of this survey is on a review of misbehaving node attacks, and detection algorithms. We firstly classify various of attacks depending on the type of misbehaving nodes.  ...  The panoramic view on misbehaving nodes and detection algorithms are further analyzed, evaluated mathematically through a number of performance metrics.  ...  Some works proposed combination of above two method which is hybrid approach to mitigate misbehaving nodes. C.  ... 
doi:10.1016/j.cose.2018.04.015 fatcat:7bbamxfmvbgrbnwklm4yoclhyq

Internet of Things for Disaster Management: State-of-the-Art and Prospects

Partha Pratim Ray, Mithun Mukherjee, Lei Shu
2017 IEEE Access  
A comprehensive discussion on the state-of-the-art scenarios to handle disastrous events is presented.  ...  Recently, Internet of Things (IoT) paradigm has opened a promising door toward catering of multitude problems related to agriculture, industry, security, and medicine due to its attractive features, such  ...  An enhanced mode of Fusion Hybrid (FH+) algorithm is proposed in [70] to detect the victim.  ... 
doi:10.1109/access.2017.2752174 fatcat:oedit3vo6rdjpopwsykoszb5hq

Quantum Computing – A European Perspective

Mikael P. Johansson, Ezhilmathi Krishnasamy, Norbert Meyer, Christelle Piechurski
2021 Zenodo  
Quantum computers have the potential to bring forth a major breakthrough in scientific computing.  ...  Europe has a unique opportunity to create world-leading supercomputing infrastructures incorporating quantum technology, by capitalising on the established expertise of European HPC centres in conjunction  ...  Acknowledgements This work was financially supported by the PRACE project funded in part by the EU's Horizon 2020 Research and Innovation programme (2014-2020) under grant agreement 823767.  ... 
doi:10.5281/zenodo.5547408 fatcat:ygudnixs2fgijgo3whkan2v5t4

Methodological Framework for Resilience Assessment of Electricity Infrastructure in Conditions of Slovak Republic

Zdenek Dvorak, Nikola Chovancikova, Jozef Bruk, Martin Hromada
2021 International Journal of Environmental Research and Public Health  
In addition, the article demonstrates several approaches towards flood resilience. Having used different methods, the primary concern is to devise a framework for resilience assessment.  ...  Third, it handles the state of the level of security risk assessment.  ...  Conflicts of Interest: The authors declare no conflict of interest. Int. J. Environ. Res. Public Health 2021, 18, 8286  ... 
doi:10.3390/ijerph18168286 pmid:34444036 pmcid:PMC8394275 fatcat:bao75los3jd7npyzlgtnciwdcq

A Hybrid Approach to Improve Flood Forecasting by Combining a Hydrodynamic Flow Model and Artificial Neural Networks

Li Li, Kyung Soo Jun
2022 Water  
In this study, a hybrid approach based on a combination of the optimization of a hydrodynamic model and an error correction modeling that exploit different aspects of the physical system is proposed to  ...  As a result, the hybrid model significantly improved the forecasting accuracy of flood water levels compared to individual models, which indicates that the hybrid model is able to take advantage of complementary  ...  For examp a zero or low derivative indicates normal or base flow while a high positive derivat indicates the rising limb of a flood event, and a high negative derivative indicates recession limb of a flood  ... 
doi:10.3390/w14091393 fatcat:v64l2cha3zd2fefhrvn6cx7pta

IEEE Access Special Section Editorial: Scalable Deep Learning for Big Data

Liangxiu Han, Daoqiang Zhang, Omer Rana, Yi Pan, Sohail Jabbar, Mazin Yousif, Moayad Aloqaily
2020 IEEE Access  
These data are stored in a private cloud to provide high security via a gateway device.  ...  This approach reconstructs the classified data points from simple to complex by the rational principle of optimal selection and the use of the inner edge adjacency list.  ... 
doi:10.1109/access.2020.3041166 fatcat:zkzdnzk22jge3l5mwju3j42mcu

Study of Time Series Data Mining for the Real Time Hydrological Forecasting: A Review

Satanand Mishra, C. Saravanan, V. K. Dwivedi
2015 International Journal of Computer Applications  
The scientific community has been trying to find out a better approach to solve the issues of flood problems.  ...  The critical reviews of the existing hydrological parameter prediction research are briefly explored to identify the present circumstances in hydrological fields and its concerned issues.  ...  GA operates on a population of potential solutions by applying the principle of survival of the fittest to achieve an optimal solution.  ... 
doi:10.5120/20692-3581 fatcat:v3vfg7a4wfgwxfdgxdgvlhvrfq

A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm

Haitham Elwahsh, Mona Gamal, A. A. Salama, I. M. El-Henawy
2018 Security and Communication Networks  
The hybrid utilizes the unsupervised learning capabilities of the SOFM to define the MANETs neutrosophic conditional variables.  ...  This research proposes a MANETs attack inference by a hybrid framework of Self-Organized Features Maps (SOFM) and the genetic algorithms (GA).  ...  Acknowledgments The authors are very thankful to Professor Dr. Florentin Smarandache from the University of New Mexico, USA, for the valuable comments and suggestions which improved this paper.  ... 
doi:10.1155/2018/5828517 fatcat:euyhfiyrlfg43ckcokivxwmep4

Security Challenges in Multihop Wireless Mesh Networks–A Survey [chapter]

Divya, Sanjeev Kumar
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
These vulnerabilities are partially due to the structure of WMNs and cannot be removed easily.  ...  A core challenge in securing the WMN is the large number of communication links over the air; as each mesh device may be mobile and deployed outdoors, each mesh link presents an exposure and vulnerability  ...  As explained before, a totally centralized approach is unlikely to be an ultimate solution for trust establishment inside a WMN.  ... 
doi:10.1007/978-3-642-11530-1_11 fatcat:sjedjytgwbeijnbovtr4azd5ey

A Novel approach for classify MANETs attacks with a neutrosophic intelligent system based on genetic algorithm

Haitham Elwahsh, Mona Gamal, A. A. Salama, M. El-Henawy
2019 Zenodo  
Recently designing an effective Intrusion Detection Systems (IDS) within Mobile Ad-hoc Networks Security (MANETs) becomes a requirement because of the amount of indeterminacy and doubt exist in that environment  ...  Neutrosophic system is a discipline that makes a mathematical formulation for the indeterminacy found in such complex situations.  ...  GA use as critical solving strategy and give ideal solution of the problem GA works on the Darwinian principle of reproduction.  ... 
doi:10.5281/zenodo.3044901 fatcat:ozu6mn4hkvhfdhud6rzkbuzpp4
« Previous Showing results 1 — 15 out of 5,075 results