Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Hamza Es-Samaali"'
Publikováno v:
BDET
Among the many challenges in the Big Data Security field is that we have to secure a high volume and velocity flow of data, this cannot be done using classic static security methods, we need a different approach, one that can analyze the traffic in r
Autor:
Larbi Boubchir, Aissam Outchakoucht, Oussama Mounnan, Hamza Es-Samaali, Abdelkrim El Mouatasim, Otman Manad
Publikováno v:
IoTSMS
The cipher-text policy attribute-based encryption is a promising technique to ensure the security in the third trust parties environment and offers opportunities to their users. However, the policy updating becomes a challenging issue when we use CP-
Publikováno v:
International Journal of Advanced Computer Science and Applications. 11
The main challenge facing the Internet of Things (IoT) in general, and IoT security in particular, is that humans have never handled such a huge amount of nodes and quantity of data. Fortunately, it turns out that Machine Learning (ML) systems are ve
Publikováno v:
Internet des objets. 3
La securite est un des serieux problemes qui menace le developpement de l'internet des objets. Cependant, cette mission devient plus complexe dans les environnements IoT vu qu'ils ont des exigences intrinseques supplementaires telles que l'heterogene
Publikováno v:
DTUC
The security is becoming the most important challenge that threatens the development of the internet of things. In this respect, access control is considered as the cornerstone and core element that should be well designed and implemented. However, t
Publikováno v:
International Journal of Advanced Computer Science and Applications. 8
The Internet of Things (IoT) is now destroying the barriers between the real and digital worlds. However, one of the huge problems that can slow down the development of this global wave, or even stop it, concerns security and privacy requirements. Th