Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Raed M. Salih"'
Publikováno v:
Disruptive Technologies in Information Sciences V.
Determining position within an indoor environment can be difficult when GPS signals become too weak. For this reason, alternatives are desired for indoor positioning systems (IPSes). The Bluetooth Low Energy (BLE) protocol is one alternative solution
Publikováno v:
CogMI
Training image extraction attacks attempt to reverse engineer training images from an already trained machine learning model. Such attacks are concerning because training data can often be sensitive in nature. Recent research has shown that extractin
This chapter proposes trust as a basis for assuring security and privacy in oppnets. It provides background information on oppnets, including a discussion of the security and privacy challenges in oppnets. Pervasive trust foundation (PTF) provides to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b38d1e38479759360b6d091bf8246699
https://doi.org/10.1201/9780429453434-11
https://doi.org/10.1201/9780429453434-11
Publikováno v:
TrustCom/BigDataSE
Health Information Exchanges (HIEs) collect and disseminate electronic patient healthcare data (EHRs/EMRs) among different healthcare providers to improve the quality and reduce the cost of healthcare services. However, the dissemination of patient d
Autor:
Andrew Decarlo, Pelin Angin, Bharat Bhargava, Leszek Lilien, Raed M. Salih, Lotfi ben Othmane
Publikováno v:
SRDS Workshop
We propose application of Opportunistic Resource Utilization Networks (Oppnets), a novel type of Mobile Ad Hoc NETworks (MANETs), for ad hoc networking of Unmanned Aerial Vehicles (UAVs) in surveillance missions. Oppnets provide effective resource vi
Autor:
Leszek Lilien, Raed M. Salih
Publikováno v:
PerCom Workshops
We report on use of Active Privacy Bundles using a Trusted Third Party (APB-TTP) for protecting privacy of users' healthcare data (incl. patients' Electronic Health Records). APB-TTP protects data that are being disseminated among different authorize
Autor:
Bharat Bhargava, Andrew Decarlo, Leszek Lilien, Raed M. Salih, Pelin Angin, Lotfi ben Othmane
Publikováno v:
Journal of Network and Computer Applications, 38, 3-15. Academic Press Inc.
Specialized ad hoc networks of unmanned aerial vehicles (UAVs) have been playing increasingly important roles in applications for homeland defense and security. Common resource virtualization techniques are mainly designed for stable networks; they f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bd3bb37f08325d515958e67fb68c334a
https://publica.fraunhofer.de/handle/publica/242192
https://publica.fraunhofer.de/handle/publica/242192
Publikováno v:
IEEE International Conference on Technologies for Homeland Security (HST, Waltham MA, USA, November 12-14, 2013), 408-413
STARTPAGE=408;ENDPAGE=413;TITLE=IEEE International Conference on Technologies for Homeland Security (HST, Waltham MA, USA, November 12-14, 2013)
STARTPAGE=408;ENDPAGE=413;TITLE=IEEE International Conference on Technologies for Homeland Security (HST, Waltham MA, USA, November 12-14, 2013)
We investigate supporting emergency response operations with opportunistic resource utilization networks ("oppnets"), based on a network paradigm for inviting and integrating diverse devices and systems available in the environment. We simulate chemi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3f85e673bf390e26e3b0c650d580044e
https://research.tue.nl/nl/publications/45ed90ea-5cf3-4681-9dd2-77fab496f565
https://research.tue.nl/nl/publications/45ed90ea-5cf3-4681-9dd2-77fab496f565
Anomaly detection is an important aspect of any security mechanism. We present an efficient anomaly detection algorithm, named BANBAD. Using Belief Networks (BNs), the algorithm identifies abnormal behavior of a feature, like inappropriate energy con
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::51027a011635308d451bbdbc76ea8bdb
https://doi.org/10.4018/978-1-60960-777-7.ch013
https://doi.org/10.4018/978-1-60960-777-7.ch013
Publikováno v:
2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
The main problem in pervasive healthcare monitoring systems is protection of patient privacy without compromising their safety. Current solutions have two main limitations: (1) they require an extensive exchange of messages among patient's caregivers