Zobrazeno 1 - 10
of 86
pro vyhledávání: '"Yavuz, Attila A."'
Autor:
Darzi, Saleh, Yavuz, Attila Altay
As network services progress and mobile and IoT environments expand, numerous security concerns have surfaced for spectrum access systems. The omnipresent risk of Denial-of-Service (DoS) attacks and raising concerns about user privacy (e.g., location
Externí odkaz:
http://arxiv.org/abs/2409.01924
Autor:
Darzi, Saleh, Yavuz, Attila A.
Given the rise in cyber threats to networked systems, coupled with the proliferation of AI techniques and enhanced processing capabilities, Denial of Service (DoS) attacks are becoming increasingly sophisticated and easily executable. They target sys
Externí odkaz:
http://arxiv.org/abs/2408.04725
The shift towards efficient and automated data analysis through Machine Learning (ML) has notably impacted healthcare systems, particularly Radiomics. Radiomics leverages ML to analyze medical images accurately and efficiently for precision medicine.
Externí odkaz:
http://arxiv.org/abs/2407.00538
The Medical Internet of Things (MIoT) harbors resource-limited medical embedded devices that collect security-sensitive data from users for analysis, monitoring, and diagnosis. Digital signatures play a foundational role in ensuring the authenticatio
Externí odkaz:
http://arxiv.org/abs/2311.18674
Threshold digital signatures enable a distributed execution of signature functionalities and will play a crucial role in the security of emerging decentralized next-generation networked systems and applications. In this paper, we provide a comprehens
Externí odkaz:
http://arxiv.org/abs/2311.05514
The rise of quantum computers exposes vulnerabilities in current public key cryptographic protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we conduct a comprehensive study on various PQ approaches, covering the con
Externí odkaz:
http://arxiv.org/abs/2310.12037
Autor:
Nouma, Saif E., Yavuz, Attila A.
Digital Twins (DT) virtually model cyber-physical objects using Internet of Things (IoT) components (e.g., sensors) to gather and process senstive information stored in the cloud. Trustworthiness of the streamed data is crucial which requires quantum
Externí odkaz:
http://arxiv.org/abs/2305.12298
AI/ML-based intrusion detection systems (IDSs) and misbehavior detection systems (MDSs) have shown great potential in identifying anomalies in the network traffic of networked autonomous systems. Despite the vast research efforts, practical deploymen
Externí odkaz:
http://arxiv.org/abs/2305.05040
Autor:
Yavuz, Attila A., Behnia, Rouzbeh
Forward-secure signatures guarantee that the signatures generated before the compromise of private key remain secure, and therefore offer an enhanced compromise-resiliency for real-life applications such as digital forensics, audit logs, and financia
Externí odkaz:
http://arxiv.org/abs/2205.07112
Publikováno v:
In International Conference on Information Security (pp. 39-58). Springer, Cham (2020)
Certificates ensure the authenticity of users' public keys, however their overhead (e.g., certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free cryptosystems, like identity-based and certificateless systems
Externí odkaz:
http://arxiv.org/abs/2103.09345