Zobrazeno 1 - 10
of 1 201
pro vyhledávání: '"Kim‐Kwang Raymond Choo"'
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 3, Pp 740-755 (2024)
Effective user authentication is key to ensuring equipment security, data privacy, and personalized services in Internet of Things (IoT) systems. However, conventional mode-based authentication methods (e.g., passwords and smart cards) may be vulnera
Externí odkaz:
https://doaj.org/article/6e869bfbb4bc4e23b5832ac3b0a67d1b
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 3, Pp 676-692 (2024)
In network traffic classification, it is important to understand the correlation between network traffic and its causal application, protocol, or service group, for example, in facilitating lawful interception, ensuring the quality of service, preven
Externí odkaz:
https://doaj.org/article/604854ec6aeb44dc97dc5be14927c778
Autor:
Shiyong Huang, Xiaohan Hao, Yani Sun, Chenhuang Wu, Huimin Li, Wei Ren, Kim-Kwang Raymond Choo
Publikováno v:
Blockchain: Research and Applications, Vol 5, Iss 3, Pp 100197- (2024)
Blockchain-based cryptocurrencies, such as Bitcoins, are increasingly popular. However, the decentralized and anonymous nature of these currencies can also be (ab)used for nefarious activities such as money laundering, thus reinforcing the importance
Externí odkaz:
https://doaj.org/article/b9a955d03d494957b139c9ddb0712bf1
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 2, Pp 237-247 (2024)
As autonomous vehicles and the other supporting infrastructures (e.g., smart cities and intelligent transportation systems) become more commonplace, the Internet of Vehicles (IoV) is getting increasingly prevalent. There have been attempts to utilize
Externí odkaz:
https://doaj.org/article/03dc6b58bfa34e698e11e15f74d59a82
Autor:
Pouyan Jahanbin, Ravi S. Sharma Fellow IET, Stephen T. Wingreen, Nir Kshetri, Kim‐Kwang Raymond Choo
Publikováno v:
IET Blockchain, Vol 3, Iss 3, Pp 159-168 (2023)
Abstract The application of Blockchain and augmented technologies such as IoT, AI, and Big Data platforms present a feasible approach for resolving the implementation challenges of trusted, decentralized platforms. This article proposes a DevOps fram
Externí odkaz:
https://doaj.org/article/696ce12365804212b76f1d933832932b
Autor:
Leonardo B. Furstenau, Pedro Leivas, Michele Kremer Sott, Michael S. Dohan, José Ricardo López-Robles, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 4, Pp 856-868 (2023)
Big data is a concept that deals with large or complex data sets by using data analysis tools (e.g., data mining, machine learning) to analyze information extracted from several sources systematically. Big data has attracted wide attention from acade
Externí odkaz:
https://doaj.org/article/7da50f2656da4fb096ff1014945969df
Autor:
Leonardo B. Furstenau, Yan Pablo Reckziegel Rodrigues, Michele Kremer Sott, Pedro Leivas, Michael S. Dohan, José Ricardo López-Robles, Manuel J. Cobo, Nicola Luigi Bragazzi, Kim-Kwang Raymond Choo
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 3, Pp 677-687 (2023)
Internet of Things (IoT) is a key technology trend that supports our digitalized society in applications such as smart countries and smart cities. In this study, we investigate the existing strategic themes, thematic evolution structure, key challeng
Externí odkaz:
https://doaj.org/article/72fd0d245e074221956f0cc0729d7baf
Autor:
Heba Saleous, Muhusina Ismail, Saleh H. AlDaajeh, Nisha Madathil, Saed Alrabaee, Kim-Kwang Raymond Choo, Nabeel Al-Qirim
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 1, Pp 211-222 (2023)
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemi
Externí odkaz:
https://doaj.org/article/6a6152efdcca4dd585c5709cc6eba554
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 4, Pp 231-242 (2023)
Adaptor signature, as a new emerging cryptographic primitive, has become one promising method to mitigate the scalability issue on blockchain. It can transform an incomplete signature into a complete signature by revealing the witness of a pre-set ha
Externí odkaz:
https://doaj.org/article/5fd8259d2ce84e4ebaecb1a1d8a312b0
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 9284-9300 (2022)
Cross-site scripting (XSS) attacks have been extensively studied in the literature, although mitigating such attacks remain a challenge for cyber defenders. In this paper, we survey the existing literature on XSS attacks, focusing on the range of att
Externí odkaz:
https://doaj.org/article/4f6c0cf29b464e3fba8d48b40f5ee70e