Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Hani Alzaid"'
Publikováno v:
Computer Networks. 144:216-229
It is difficult to assess the security of modern networks because they are usually dynamic with configuration changes (such as changes in topology, firewall rules, etc). Graphical security models (e.g., Attack Graphs and Attack Trees) are widely used
Publikováno v:
ACSW
It is important to assess the cost benefits of IT security investments. Typically, this is done by manual risk assessment process. In this paper, we propose an approach to automate this using graphical security models (GSMs). GSMs have been used to a
Publikováno v:
TrustCom/BigDataSE/ICESS
It is difficult to assess the security of modern enterprise networks because they are usually dynamic with configuration changes (such as changes in topology, firewall rules, etc). Graphical security models (e.g., Attack Graphs and Attack Trees) and
Publikováno v:
TrustCom/BigDataSE/ICESS
In the Internet of Things (IoT), smart devices are connected using various communication protocols, such as Wi-Fi, ZigBee. Some IoT devices have multiple built-in communication modules. If an IoT device equipped with multiple communication protocols
Autor:
Hani Alzaid
Publikováno v:
Security of Self-Organizing Networks ISBN: 9780429094392
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5497b7801745bcbe41c031b560647f27
https://doi.org/10.1201/ebk1439819197-24
https://doi.org/10.1201/ebk1439819197-24
Publikováno v:
Security and Communication Networks. 5:125-144
In-network aggregation is considered as an efficient way to reduce the energy consumption in wireless sensor networks (WSNs). However, it opens doors for a compromised node to distort the integrity of the aggregated data by altering the data and disr
Publikováno v:
TrustCom/ISPA/IUCC
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cl
Publikováno v:
IISA
Wireless sensor networks (WSNs) often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Due to these unique specifications and a lack of tamper-resistant hardware, dev
Publikováno v:
Med-Hoc-Net
In-network data aggregation is an effective method to reduce the amount of data transmitted and therefore saves energy consumption in sensor networks. However, an adversary may compromise some sensor nodes, and use them to forge false values as the a
Autor:
Sebastian Ries, Hani Alzaid, Muneera Albabtain, Audun Jøsang, Manal Alfaraj, Alhanof Abuhaimed
Publikováno v:
Trust Management VII ISBN: 9783642383229
IFIPTM
IFIPTM
Cryptographic mechanisms alone are insufficient to protect Wireless Sensor Networks (WSNs), because sensors are deployed for long periods in hostile environments where it is possible for an adversary to physically take over a sensor and obtain access
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cbf383de30fb8eae042cd8422be676c6
https://doi.org/10.1007/978-3-642-38323-6_5
https://doi.org/10.1007/978-3-642-38323-6_5