Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Raouf Khayami"'
Publikováno v:
Expert Systems. 40
Publikováno v:
Neural Computing and Applications. 32:16119-16133
With the increasing use of the Internet of things (IoT) in diverse domains, security concerns and IoT threats are constantly rising. The computational and memory limitations of IoT devices have resulted in emerging vulnerabilities in most IoT-run env
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 7:314-323
With increasing reliance on Internet of Things (IoT) devices and services, the capability to detect intrusions and malicious activities within IoT networks is critical for resilience of the network infrastructure.In this paper, we present a novel mod
Autor:
David Ellis Newton, Kim-Kwang Raymond Choo, Ali Dehghantanha, Sattar Hashemi, Marzieh Ahmadzadeh, Raouf Khayami, Sajad Homayoun
Publikováno v:
Future Generation Computer Systems. 90:94-104
Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such nodes typically contain considerably amount of sensitive data. The capability to efficiently hunt abnormalities relating to ransomwar
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A crypto ransomware removes data custodian access by encrypting valuable data on victims' computers and requests a ransom payment to reinstantiate custodian access b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4d91f55692de77b35047fc2109f35101
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 10:3469-3479
In our rapidly-growing big-data area, often the big sensory data from Internet of Things (IoT) cannot be sent directly to the far data-center in an efficient way because of the limitation in the network infrastructure. Fog computing, which has increa
Autor:
Pirooz Shamsinejadbabaki, Hojjat Adeli, Ahmad Hassanpour, Seyed Raouf Khayami, Majid Moradikia
Publikováno v:
Expert Systems. 36
Publikováno v:
Future Generation Computer Systems. 85:88-96
Internet of Things (IoT) devices are increasingly deployed in different industries and for different purposes (e.g. sensing/collecting of environmental data in both civilian and military settings). The increasing presence in a broad range of applicat
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 14:213-223
With the increasing market share of Mac OS X operating system, there is a corresponding increase in the number of malicious programs (malware) designed to exploit vulnerabilities on Mac OS X platforms. However, existing manual and heuristic OS X malw
Publikováno v:
Computers & Electrical Engineering. 87:106767
Image-guided interventions are saving the lives of a large number of patients where the image registration problem should indeed be considered as the most complex and complicated issue to be tackled. On the other hand, the recently huge progress in t