Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Tianbo Gu"'
Publikováno v:
High-Confidence Computing, Vol 1, Iss 1, Pp 100004- (2021)
IoT systems are revolutionizing our life by providing ubiquitous computing, inter-connectivity, and automated control. However, the increasing system complexity poses huge challenges for security as IoT devices are distributed, highly heterogeneous,
Externí odkaz:
https://doaj.org/article/0ff37973fe9f441fbc0520e2d8058f29
Publikováno v:
IEEE Transactions on Mobile Computing. :1-15
Autor:
Pengfei Hu, Zizhan Zheng, Sencun Zhu, Prasant Mohapatra, Aveek K. Das, Tianbo Gu, Hao Fu, Parth H. Pathak
Publikováno v:
IEEE Transactions on Mobile Computing. 20:3066-3080
While mobile apps often need to transmit sensitive information out to support various functionalities, they may also abuse the privilege by leaking the data to unauthorized third parties. This makes us question: Is the given transmission required to
Publikováno v:
2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI).
Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT applications, mobile apps, and the physical environment. However, existing IoT security analyses only focus on a subset of all the essential components, such as device f
Publikováno v:
High-Confidence Computing, Vol 1, Iss 1, Pp 100004-(2021)
IoT systems are revolutionizing our life by providing ubiquitous computing, inter-connectivity, and automated control. However, the increasing system complexity poses huge challenges for security as IoT devices are distributed, highly heterogeneous,
Publikováno v:
PIMRC
Internet of Things (IoT) has been emerging as one of the most significant technologies that may change the world. The development and deployment of IoT systems significantly improve the efficiency of work, advance the development of productive force,
Publikováno v:
PIMRC
In recent years, there is an emerging trend that some computing services are moving from cloud to the edge of the networks. Compared to cloud computing, edge computing can provide services with faster response, lower expense, and more security. The m
Publikováno v:
WoWMoM
As a massive number of the Internet of Things (IoT) devices are deployed, the security and privacy issues in IoT arouse more and more attention. The IoT attacks are causing tremendous loss to the IoT networks and even threatening human safety. Compar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::714c7233cf75250704e9ee19d3191663
http://arxiv.org/abs/2006.15826
http://arxiv.org/abs/2006.15826
Publikováno v:
INFOCOM
Internet of Things (IoT) has become the most promising technology for service automation, monitoring, and interconnection, etc. However, the security and privacy issues caused by IoT arouse concerns. Recent research focuses on addressing security iss
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8b7afee913b288debab84e038014654f
http://arxiv.org/abs/2006.15827
http://arxiv.org/abs/2006.15827
Autor:
Jianguo Jiang, Tianbo Gu, Weiqing Huang, Prasant Mohapatra, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Min Yu
Publikováno v:
MILCOM
Existing insider threat detection models and frameworks generally focus on characterizing and detecting malicious insiders, for example by fusing behavioral analysis, machine learning, psychological characters, management measures, etc. However, it r