Ensemble adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles
A Rehman Javed, Z Jalil… - Transactions on …, 2022 - Wiley Online Library
The key characteristic of smart cities (ie, connectivity and intelligence) has enabled
connected vehicles to work together to accomplish complex jobs that they are unable to …
connected vehicles to work together to accomplish complex jobs that they are unable to …
SBAC: A secure blockchain-based access control framework for information-centric networking
Q Lyu, Y Qi, X Zhang, H Liu, Q Wang… - Journal of Network and …, 2020 - Elsevier
The information-centric networking (ICN) has been proposed to meet the increasing demand
for efficient content delivery. However, the in-network caching mechanism of ICN makes it …
for efficient content delivery. However, the in-network caching mechanism of ICN makes it …
{UCBlocker}: Unwanted call blocking using anonymous authentication
Telephone users are receiving more and more unwanted calls including spam and scam
calls because of the transfer-without-verification nature of global telephone networks, which …
calls because of the transfer-without-verification nature of global telephone networks, which …
Consumer-facing technology fraud: Economics, attack methods and potential solutions
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …
Reputable–a decentralized reputation system for blockchain-based ecosystems
Reputation systems are an important means to facilitate trustworthy interactions between on-
and off-chain services and users. However, contemporary reputation systems are typically …
and off-chain services and users. However, contemporary reputation systems are typically …
Layer-based privacy and security architecture for cloud data sharing
Sažetak The management of data while maintaining its utility and preservation of security
scheme is a matter of concern for the cloud owner. In order to minimize the overhead at …
scheme is a matter of concern for the cloud owner. In order to minimize the overhead at …
TrustVote: Privacy-preserving node ranking in vehicular networks
The Internet of Vehicles is the network of connected vehicles and transport infrastructure
units [roadside units (RSUs)], which utilizes emerging wireless systems (4G, 5G, LTE) for the …
units [roadside units (RSUs)], which utilizes emerging wireless systems (4G, 5G, LTE) for the …
MQTT-Auth: A token-based solution to endow MQTT with authentication and authorization capabilities
Sažetak Security in the Internet of Things is a current hot topic and it may comprise different
aspects such as confidentiality and integrity of personal data, as well as the authentication …
aspects such as confidentiality and integrity of personal data, as well as the authentication …
PrivBox: Verifiable decentralized reputation system for online marketplaces
In online marketplaces (e-commerce, cloud marketplaces), potential buyers/consumers do
not have direct access to inspect the quality of products and services offered by retailers and …
not have direct access to inspect the quality of products and services offered by retailers and …
Systems and methods for SPIT detection in VoIP: Survey and future directions
Abstract In recent years, VoIP (Voice over IP) telephony has shown a tremendous increase
in the number of subscribers due to today's affordable telephony rates and flexible use of …
in the number of subscribers due to today's affordable telephony rates and flexible use of …