Zobrazeno 1 - 10
of 170
pro vyhledávání: '"Reza M. Parizi"'
Autor:
Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Reza M. Parizi
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 5, Pp 1123-1130 (2023)
Industrial Internet of Things (IIoT) systems depend on a growing number of edge devices such as sensors, controllers, and robots for data collection, transmission, storage, and processing. Any kind of malicious or abnormal function by each of these d
Externí odkaz:
https://doaj.org/article/ab8cff8e20ca41d39ec4afc1586a3198
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 2, Pp 313-326 (2023)
Searchable Encryption (SE) enables data owners to search remotely stored ciphertexts selectively. A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users, and even r
Externí odkaz:
https://doaj.org/article/63459c6bff424e1185c102de1d64e7ba
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 1, Pp 101-110 (2023)
By the emergence of the fourth industrial revolution, interconnected devices and sensors generate large-scale, dynamic, and inharmonious data in Industrial Internet of Things (IIoT) platforms. Such vast heterogeneous data increase the challenges of s
Externí odkaz:
https://doaj.org/article/fc4ab8d89de9405c8ad7cb0dc67bb315
Autor:
Christopher Regan, Mohammad Nasajpour, Reza M. Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, Kim-Kwang Raymond Choo
Publikováno v:
Machine Learning with Applications, Vol 8, Iss , Pp 100263- (2022)
Internet of Things (IoT) devices are mass-produced and designed for different applications, ranging from monitoring of the environment to on-demand electrical switches, and so on. These IoT devices are often heterogeneous in nature, only to receive u
Externí odkaz:
https://doaj.org/article/8e77e2f4a1464dfabb37cd6045e1e3a5
Autor:
Muhammad Usman Tariq, Muhammad Haseeb, Mohammed Aledhari, Rehma Razzak, Reza M. Parizi, Fahad Saeed
Publikováno v:
IEEE Access, Vol 9, Pp 5497-5516 (2021)
Big Data Proteogenomics lies at the intersection of high-throughput Mass Spectrometry (MS) based proteomics and Next Generation Sequencing based genomics. The combined and integrated analysis of these two high-throughput technologies can help discove
Externí odkaz:
https://doaj.org/article/c0f8574a8ff64b949a36eef5a93f9b57
Publikováno v:
IEEE Access, Vol 9, Pp 117734-117745 (2021)
The rise in popularity of Internet of Things (IoT) devices has attracted hackers to develop IoT-specific attacks. The microservice architecture of IoT devices relies on the Internet to provide their intended services. An unguarded IoT network makes i
Externí odkaz:
https://doaj.org/article/efceb78025274c7295b80f78df72a9a8
Publikováno v:
Digital Communications and Networks, Vol 6, Iss 2, Pp 147-156 (2020)
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. Thi
Externí odkaz:
https://doaj.org/article/a39c37ce9d974164a79f7d493432804b
Publikováno v:
IEEE Access, Vol 8, Pp 83965-83973 (2020)
The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing devastating outcomes. Traditional Intrusion Detection Systems (IDSs), which a
Externí odkaz:
https://doaj.org/article/edbb8a8fde144f26b95e0b8ba85b2584
Publikováno v:
IEEE Access, Vol 8, Pp 140699-140725 (2020)
This paper provides a comprehensive study of Federated Learning (FL) with an emphasis on enabling software and hardware platforms, protocols, real-life applications and use-cases. FL can be applicable to multiple domains but applying it to different
Externí odkaz:
https://doaj.org/article/cb39e9236aae4a9399f1cd10c696bf8a
Publikováno v:
IEEE Access, Vol 8, Pp 139188-139198 (2020)
The rise of emerging cyberthreats has led to a shift of focus on identifying the source of threat instead of the type of attack to provide a more effective defense to compromised environments against malicious acts. The most complex type of cyberthre
Externí odkaz:
https://doaj.org/article/326d43f75ca94ce590d67fce2a98f262