Zobrazeno 1 - 10
of 449
pro vyhledávání: '"Vijay Varadharajan"'
Publikováno v:
IEEE Access, Vol 8, Pp 222310-222354 (2020)
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyberspace has become more vulnerable to automated and prolonged cyberattacks. Cyber security techniques provide enhancements in security measures to det
Externí odkaz:
https://doaj.org/article/928f930607ec4796acaa15b0ef05a8f3
Autor:
B.M. Ruhul Amin, Seyedfoad Taghizadeh, Md. Shihanur Rahman, Md. Jahangir Hossain, Vijay Varadharajan, Zhiyong Chen
Publikováno v:
IET Cyber-Physical Systems (2020)
Cyber attacks can cause cascading failures and blackouts in smart grids. Therefore, it is highly necessary to identify the types, impacts and solutions of cyber attacks to ensure the secure operation of power systems. As a well-known practice, steady
Externí odkaz:
https://doaj.org/article/2b6ddc20ac3d4c70badf00ea48e33237
Publikováno v:
IEEE Access, Vol 6, Pp 11523-11533 (2018)
Today there is considerable interest for making use of the latest technological advancements for several healthcare applications. However, there are several challenges for making use of different technologies for healthcare applications. In particula
Externí odkaz:
https://doaj.org/article/f0bf0d96d494464292ae8a14667aebfb
Publikováno v:
IEEE Access, Vol 6, Pp 49418-49431 (2018)
An important problem of cyber-security is malware analysis. Besides good precision and recognition rate, ideally, a malware detection scheme needs to be able to generalize well for novel malware families (a.k.a zero-day attacks). It is important that
Externí odkaz:
https://doaj.org/article/4d4cf8f9973f4076bd53e7cff2519705
Publikováno v:
Digital Communications and Networks, Vol 6, Iss 2, Pp 145-146 (2020)
Externí odkaz:
https://doaj.org/article/7576afbf14fa4dfebb58f3879b71d028
Autor:
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, Ibrahim A. Hameed, Shan Chen, Dongxi Liu, Jiaming Li
Publikováno v:
Energies, Vol 13, Iss 10, p 2509 (2020)
Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious thre
Externí odkaz:
https://doaj.org/article/cbb1a8b8440646da8e06e2989a0d1fa9
Publikováno v:
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, Vol 4, Iss 13 (2018)
There has been tremendous growth in the application of the Internet of Things (IoT) in our daily lives. Yet with this growth has come numerous security concerns and privacy challenges for both the users and the systems. Smart devices have many uses i
Externí odkaz:
https://doaj.org/article/529fa5683ee34c29aa8408416be3b76c
Publikováno v:
IEEE Internet of Things Journal. 9:25037-25051
Publikováno v:
IEEE Transactions on Network and Service Management. 19:1065-1082
Future communication networks such as 5G are expected to support end-to-end delivery of services for several vertical markets with diverging requirements. Network slicing is a key construct that is used to provide end to end logical virtual networks
Publikováno v:
IEEE Transactions on Services Computing. :1-14