过去一年中添加的文章,按日期排序

[PDF][PDF] Design and Implementation of IPsec VPN IoT Gateway System in National Secret Algorithm

Y Jiang, J Huang, Y Fan, X Zhu - … of Cyber Security …, 2024 - journals.riverpublishers.com
29 天前 - … subnets, meeting the requirements of applications in high… with the security
requirements of the Internet of Things (IoT… an IPSec VPN IoT security gateway based on domestic …

Leveraging Digital Twins and SIEM Integration for Incident Response in OT Environments

A Arias, C Arellano, U Zurutuza - … (JNIC)(9ª. 2024. Sevilla)(2024), pp. 294 …, 2024 - idus.us.es
29 天前 - … the identified requirements for the proposed platform. These requirements provide a
clear … The platform requirements have been determined based on the excellent adaptability …

Online Learning and Model Pruning Against Concept Drifts in Edge Devices

S Magnani, S Tirupathi, RD Corin… - IEEE International …, 2024 - research.ibm.com
29 天前 - … The proliferation of Internet of Things sensors has driven the adoption of the edge
computing … I/ADSs, which can be adopted also in devices with strict resource requirements. …

Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds

Y Zhou, G Cheng, Z Ouyang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
30 天前 - Edge computing (EC) and container technology have been widely used to
increase the flexibility of computing resources and meet the real-time requirements for delay-…

Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic Keys

S Jain, AR Korenda, B Cambou, C Lucero - Science and Information …, 2024 - Springer
30 天前 - This paper outlines our primary objectives, which revolved around devising a robust
and lightweight solution for safeguarding industrial Internet of Things (IoT) device’s content. …

A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid

Y Wu, H Guo, Y Han, S Li, J Liu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
32 天前 - … is the most secure one which meets the requirements for SG functionality and
security. … control protocol for the smart grid systems,” IEEE Internet Things J., vol. 9, no. 9, pp. …

Reputation-Based Stable Blockchain Sharding Scheme for Smart Cities With IoT Consumer Electronics: A Deep Reinforcement Learning Approach

Y Li, X Luo, W Zhao, H Gao - IEEE Transactions on Consumer …, 2024 - ieeexplore.ieee.org
32 天前 - … used in security-enabled smart cities. However, considering high scalability
requirements from the IoT consumer electronics, this strategy may lead to higher security risks for a …

Accelerating Communication-efficient Federated Multi-Task Learning With Personalization and Fairness

R Xie, C Li, X Zhou, Z Dong - IEEE Transactions on Parallel …, 2024 - ieeexplore.ieee.org
32 天前 - Federated learning techniques provide a promising framework for collaboratively
training a machine learning model without sharing users' data, and delivering a security

[PDF][PDF] Software Architecture in Practice: Challenges and Opportunities in the Age of Digital Transformation: Literature Review

OM Albada, N Salman - researchgate.net
32 天前 - … Common software architecture tasks at software requirements, design, construction,
and testing were covered in our report. Phases of maintenance and the associated …

Secure by Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM)

J Marchang, J McDonald, S Keishing, K Zoughalian… - 2024 - preprints.org
32 天前 - … The proposed RTPM focuses on addressing the major security requirements for an
IoMT system: confidentiality, integrity, availability, conducts authentication, protect from DoS …