Qusecnets: Quantization-based defense mechanism for securing deep neural network against adversarial attacks
Adversarial examples have emerged as a significant threat to machine learning algorithms,
especially to the convolutional neural networks (CNNs). In this paper, we propose two …
especially to the convolutional neural networks (CNNs). In this paper, we propose two …
[HTML][HTML] Security analysis of cyber physical system using digital forensic incident response
There is a great demand for an efficient security tool which can secure IIoT systems from
potential adversarial attacks. However, it is challenging to design a suitable security model …
potential adversarial attacks. However, it is challenging to design a suitable security model …
A pattern-language for self-healing internet-of-things systems
Internet-of-Things systems are assemblies of highly-distributed and heterogeneous parts
that, in orchestration, work to provide valuable services to end-users in many scenarios …
that, in orchestration, work to provide valuable services to end-users in many scenarios …
A beginner's guide to infrastructure‐less networking concepts
Infrastructure‐less networks connect communication devices end‐to‐end by managing links
and routes independent of fixed networking facilities, relying on dedicated protocols running …
and routes independent of fixed networking facilities, relying on dedicated protocols running …
Toward a full exploitation of IoT in smart cities: A review of IoT anomaly detection techniques
The world is currently progressing towards a new connectivity era where billions of sensors
are connected over a network called the Internet of Things (IoT). IoT enables a wide range of …
are connected over a network called the Internet of Things (IoT). IoT enables a wide range of …
Cyber-physical trust systems driven by blockchain
Cyber Physical Trust Systems (CPTS) are Cyber Physical Systems and Internet of Things
enriched with trust as an explicit, measurable, testable and verifiable system component. In …
enriched with trust as an explicit, measurable, testable and verifiable system component. In …
Resilient IoT-based monitoring system for crude oil pipelines
S Ahmed, F Le Mouël, N Stouls - 2020 7th International …, 2020 - ieeexplore.ieee.org
Pipeline networks dominate the oil and gas midstream sector, and although the safest
means of transportation for oil and gas products, they are susceptible to failures. These …
means of transportation for oil and gas products, they are susceptible to failures. These …
[PDF][PDF] A logic for monitoring dynamic networks of spatially-distributed cyber-physical systems
Cyber-Physical Systems (CPS) consist of inter-wined computational (cyber) and physical
components interacting through sensors and/or actuators. Computational elements are …
components interacting through sensors and/or actuators. Computational elements are …
MoonLight: A lightweight tool for monitoring spatio-temporal properties
We present MoonLight, a tool for monitoring temporal and spatio-temporal properties of
mobile and spatially distributed cyber-physical systems (CPS). In the proposed framework …
mobile and spatially distributed cyber-physical systems (CPS). In the proposed framework …
Fostering new vertical and horizontal IoT applications with intelligence everywhere
Intelligence Everywhere is predicated on the seamless integration of INTERNET of Things
(IoT) networks transporting a vast amount of data streams through many computing …
(IoT) networks transporting a vast amount of data streams through many computing …