Zobrazeno 1 - 10
of 525
pro vyhledávání: '"Benzaid, A."'
Federated Learning (FL) enables training of a global model from distributed data, while preserving data privacy. However, the singular-model based operation of FL is open with uploading poisoned models compatible with the global model structure and c
Externí odkaz:
http://arxiv.org/abs/2409.08237
Industrial Internet of Things (IIoT) is highly sensitive to data privacy and cybersecurity threats. Federated Learning (FL) has emerged as a solution for preserving privacy, enabling private data to remain on local IIoT clients while cooperatively tr
Externí odkaz:
http://arxiv.org/abs/2408.08722
The industrial Internet of Things (IIoT) involves the integration of Internet of Things (IoT) technologies into industrial settings. However, given the high sensitivity of the industry to the security of industrial control system networks and IIoT, t
Externí odkaz:
http://arxiv.org/abs/2401.00468
Autor:
Benzaid, Rachid, Benaissa, Abbes
In this paper, we consider the well-posedness and stability of a one-dimensional system of degenerate wave equations coupled via zero order terms with one boundary fractional damping acting on one end only. We prove optimal polynomial energy decay ra
Externí odkaz:
http://arxiv.org/abs/2310.11174
The open radio access network (O-RAN) architecture's native virtualization and embedded intelligence facilitate RAN slicing and enable comprehensive end-to-end services in post-5G networks. However, any vulnerabilities could harm security. Therefore,
Externí odkaz:
http://arxiv.org/abs/2309.13444
Autor:
Benzaid, C., Taleb, T.
Artificial Intelligence (AI) is envisioned to play a pivotal role in empowering intelligent, adaptive and autonomous security management in 5G and beyond networks, thanks to its potential to uncover hidden patterns from a large set of time-varying mu
Externí odkaz:
http://arxiv.org/abs/2201.02730
Several solutions have been proposed in the literature to address the Unmanned Aerial Vehicles (UAVs) collision avoidance problem. Most of these solutions consider that the ground controller system (GCS) determines the path of a UAV before starting a
Externí odkaz:
http://arxiv.org/abs/2201.01414
Cellular-based Unmanned Aerial Vehicle (UAV) systems are a promising paradigm to provide reliable and fast Beyond Visual Line of Sight (BVLoS) communication services for UAV operations. However, such systems are facing a serious GPS spoofing threat f
Externí odkaz:
http://arxiv.org/abs/2201.00568
Autor:
Grib, Ismahene, Berredjem, Malika, Djouad, Seif-Eddine, Benzaid, Chahrazed, Rachedi, Khadidja Otmane, Bahadi, Rania, Djendi, Lina Manel, Ibrahim-Ouali, Malika, Bouacida, Sofiane, Bachari, Khaldoun, Laichi, Yacine, Marminon, Christelle, Borgne, Marc LE, Bouasla, Radia
Publikováno v:
In Journal of Molecular Structure 5 August 2024 1309
Autor:
Theodoros Theodoropoulos, Luis Rosa, Chafika Benzaid, Peter Gray, Eduard Marin, Antonios Makris, Luis Cordeiro, Ferran Diego, Pavel Sorokin, Marco Di Girolamo, Paolo Barone, Tarik Taleb, Konstantinos Tserpes
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 4, Pp 758-793 (2023)
Cloud-native services face unique cybersecurity challenges due to their distributed infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man-in-the-Middle (MITM) attacks. Additionally, these services often process s
Externí odkaz:
https://doaj.org/article/c55a4a90ae134859a0a22668c3b8263c