Search Results - "Security and Privacy in Computing and Communications"
-
1
A blockchain-based secure storage scheme for medical information
ISSN: 1687-1499, 1687-1472, 1687-1499Published: Cham Springer International Publishing 25.04.2022Published in EURASIP journal on wireless communications and networking (25.04.2022)“… However, current medical information is subject to the risk of privacy leakage and difficult to share…”
Get full text
Journal Article -
2
The analysis of financial market risk based on machine learning and particle swarm optimization algorithm
ISSN: 1687-1499, 1687-1472, 1687-1499Published: Cham Springer International Publishing 02.04.2022Published in EURASIP journal on wireless communications and networking (02.04.2022)“…The financial industry is a key to promoting the development of the national economy, and the risk it takes is also the largest hidden risk in the financial…”
Get full text
Journal Article -
3
Heuristic approaches for the car sequencing problems with block batches
ISSN: 1687-1499, 1687-1472, 1687-1499Published: Cham Springer International Publishing 28.03.2022Published in EURASIP journal on wireless communications and networking (28.03.2022)“…) that minimizes the conflicts occur when sequentially manufacturing cars on an assembly line. The CSP is a well-established problem, subject to the paint batching constraints…”
Get full text
Journal Article -
4
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
ISSN: 2324-9013Published: IEEE 01.12.2020Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.12.2020)“… That is, mutable attributes about subjects, resources and environment as well as trust levels that are continuously…”
Get full text
Conference Proceeding -
5
Securing the Internet of Things (IoT): A Security Taxonomy for IoT
ISSN: 2324-9013Published: IEEE 01.08.2018Published in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (01.08.2018)“…In Internet of Things (IoT), there is a vast number of connected devices that exist. These devices are collecting and transmitting great volumes of data from…”
Get full text
Conference Proceeding -
6
A formalization-based vulnerability detection method for cross-subject network components
ISSN: 2324-9013Published: IEEE 01.12.2022Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.12.2022)“…With the rapid development of computer technology, the cross-subject network components (CSNC…”
Get full text
Conference Proceeding -
7
A Generic Information and Consent Framework for the IoT
ISSN: 2324-9013Published: IEEE 01.08.2019Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.08.2019)“… In this paper, we propose a generic framework for information and consent in the IoT which is protective both for data subjects and for data controllers…”
Get full text
Conference Proceeding -
8
LUCON: Data Flow Control for Message-Based IoT Systems
ISSN: 2324-9013Published: IEEE 01.08.2018Published in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (01.08.2018)“… Traditional access and usage control mechanisms are only able to determine if data may be used by a subject, but lack an understanding of how it…”
Get full text
Conference Proceeding -
9
Survey on Recognition of Privacy Risk from Responding on Twitter
ISSN: 2324-9013Published: IEEE 01.11.2023Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.11.2023)“…Social networking services (SNS) are often the subject of privacy concerns. Hence users should be careful not to post content with unacceptable privacy risks…”
Get full text
Conference Proceeding -
10
A Comparative Analysis of Federated Learning Techniques on On-Demand Platforms in Supporting Modern Web Browser Applications
ISSN: 2324-9013Published: IEEE 01.11.2023Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.11.2023)“…On-device learning, such as federated learning, is gaining more popularity. It benefits users with faster inference and privacy preservation. However, the…”
Get full text
Conference Proceeding -
11
CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem
ISSN: 2324-9013Published: IEEE 01.12.2022Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.12.2022)“…Software in modern vehicles is becoming increasingly complex and subject to vulnerabilities that an intruder can exploit to alter the functionality of vehicles…”
Get full text
Conference Proceeding -
12
Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites
ISSN: 2324-9013Published: IEEE 01.01.2022Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.01.2022)“… Electronic reconnaissance using satellites group is easy to implement. Bearings-only geolocation is an important research subject in the electronic reconnaissance field…”
Get full text
Conference Proceeding -
13
Ergonomic Design of Precise Percutaneous Robot for Substantial Organs Based on JACK Simulation
ISSN: 2324-9013Published: IEEE 01.11.2023Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.11.2023)“…To improve the comfort of surgeons during the use of minimally invasive surgical robots and reduce occupational hazards, the precise puncture robot for vital organs was selected as the research subject…”
Get full text
Conference Proceeding -
14
Towards Trust-Centric Networking: A General Model for Trust Evaluation
ISSN: 2324-9013Published: IEEE 01.11.2023Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.11.2023)“…Advances in networking and computing are moving society towards a cyber space, in which more aspects of our daily lives are being conducted over the Internet…”
Get full text
Conference Proceeding -
15
On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic
ISSN: 2324-9013Published: IEEE 01.12.2022Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.12.2022)“… However, the encryption proxies used by some projects may be subject to configuration error or adversary attack makes the encryption ineffective…”
Get full text
Conference Proceeding -
16
A hybrid BCI system combining motor imagery and conceptual imagery in a smart home environment
ISSN: 2324-9013Published: IEEE 01.12.2022Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.12.2022)“…In this study, we combined the advantages of two spontaneous brain-computer interface instruction paradigms, conceptual imagery and motor imagery, to develop a…”
Get full text
Conference Proceeding -
17
Automated Breast Cancer Detection Using Machine Learning Techniques by Extracting Different Feature Extracting Strategies
ISSN: 2324-9013Published: IEEE 01.08.2018Published in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (01.08.2018)“…) kernels and Decision Tree to distinguish cancer mammograms from normal subjects. Different features are proposed such as texture, morphological entropy based, scale invariant feature transform (SIFT…”
Get full text
Conference Proceeding -
18
An Intelligent Charging Service Selection Scheme Under the Cross-Area Consensus of Blockchain for the IoV
ISSN: 2324-9013Published: IEEE 17.12.2024Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (17.12.2024)“… factors of vehicle charging service and the subject tendency of users to each factor, and recommends the optimal charging pile to meet the subjective needs of users. Compared with similar work, it has a great improvement in shortening the driving distance to a charging pile, reducing the time spent waiting for charging and reducing the charging cost…”
Get full text
Conference Proceeding -
19
Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling
ISSN: 2324-9013Published: IEEE 17.12.2024Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (17.12.2024)“… be ignored, and may be subject to BGP hijacking attacks, distributed denial of service attacks, and node vulnerability attacks, which will bring greater risks to some private information, so an important…”
Get full text
Conference Proceeding -
20
SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity Kernel
ISSN: 2324-9013Published: IEEE 01.10.2021Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.10.2021)“… However, the page tables are fundamental weakness of operating system because they share the same address space with the vulnerable kernel, and thus subject to kernel data-only attack…”
Get full text
Conference Proceeding