Zobrazeno 1 - 10
of 173
pro vyhledávání: '"Raheem Beyah"'
Publikováno v:
Energies, Vol 16, Iss 18, p 6551 (2023)
Previous studies have shown that the contact wear estimation of circuit breakers can be based on the accumulative arc duration. However, one problem that remains unresolved is how to reliably measure the arc duration. Existing methods encounter diffi
Externí odkaz:
https://doaj.org/article/6f5c73b70fd54d05a1cc82868639a9a2
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Publikováno v:
Big Data Mining and Analytics, Vol 2, Iss 2, Pp 118-144 (2019)
Image captchas have recently become very popular and are widely deployed across the Internet to defend against abusive programs. However, the ever-advancing capabilities of computer vision have gradually diminished the security of image captchas and
Externí odkaz:
https://doaj.org/article/4c937b07117b47dba1a02674d57ddd13
Publikováno v:
Cybersecurity, Vol 1, Iss 1, Pp 1-18 (2018)
Abstract The popularity of cloud hosting services also brings in new security chal- lenges: it has been reported that these services are increasingly utilized by miscreants for their malicious online activities. Mitigating this emerging threat, posed
Externí odkaz:
https://doaj.org/article/e467a8429d0843cc8f55f2c105afac4f
Autor:
Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, Raheem Beyah
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:1169-1185
Autor:
Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-18
Currently, the development of IoT firmware heavily depends on third-party components (TPCs) to improve development efficiency. Nevertheless, TPCs are not secure, and the vulnerabilities in TPCs will influence the security of IoT firmware. Existing wo
Autor:
Ting Wang, Shanqing Guo, Haiqin Weng, Zonghui Wang, Shouling Ji, Bo Li, Raheem Beyah, Changjiang Li, Jie Shi
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3987-4001
Autor:
Anu G. Bourgeois, Raheem Beyah, Brendan Saltaformaggio, Shouling Ji, David Formby, Qinchen Gu
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3218-3230
Autor:
Haiqin Weng, Jingzheng Wu, Raheem Beyah, Wei-Han Lee, Liming Fang, Shouling Ji, Binbin Zhao, Changting Lin, Pan Zhou
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:1826-1840
The Internet of Things (IoT) has become ubiquitous and greatly affected peoples‘ daily lives. With the increasing development of IoT devices, the corresponding security issues are becoming more and more challenging. Such a severe security situation
Autor:
Chunming Wu, Yuwei Li, Jianhai Chen, Shouling Ji, Yuan Chen, Raheem Beyah, Qinchen Gu, Chenyang Lyu
Publikováno v:
IEEE Transactions on Cybernetics. 52:3745-3756
Fuzzing is a technique of finding bugs by executing a target program recurrently with a large number of abnormal inputs. Most of the coverage-based fuzzers consider all parts of a program equally and pay too much attention to how to improve the code
Publikováno v:
ACM Transactions on Sensor Networks.
ICPS software and hardware suffer from low update frequency, making it easier for insiders to bypass external defenses and launch concealed destructive attacks. To address these concerns, we design a device fingerprinting method based on multi-physic