A taxonomy of security and privacy requirements for the Internet of Things (IoT)
I Alqassem, D Svetinovic - 2014 IEEE International Conference …, 2014 - ieeexplore.ieee.org
Capturing security and privacy requirements in the early stages of system development is
essential for creating sufficient public confidence in order to facilitate the adaption of novel …
essential for creating sufficient public confidence in order to facilitate the adaption of novel …
Classification analysis of intrusion detection on NSL-KDD using machine learning algorithms
Since three decades, artificial intelligence has been evolved in order to outperform the tasks
that human beings are not capable. These tasks can be any problem from our lives and one …
that human beings are not capable. These tasks can be any problem from our lives and one …
Quantifying DDS-cerberus network control overhead
AT Park, N Peck, R Dill, DD Hodson… - The Journal of …, 2023 - Springer
Securing distributed device communication is critical because the private industry and the
military depend on these resources. One area that adversaries target is the middleware …
military depend on these resources. One area that adversaries target is the middleware …
A preliminary framework using bpnn for performability modelling and analyses of a kerberos server
This paper presents a preliminary framework using back propagation neural networks for
performability evaluation of Kerberos servers. In the modelling approach, keys under …
performability evaluation of Kerberos servers. In the modelling approach, keys under …
[PDF][PDF] Modelling Approaches of Performance Evaluation Of High QoS Of Kerberos Server With Dynamically Renewing Keys Under Pseudo Conditions
In literature, some existing studies suggested different proposed approaches that interrupt
temporary link/server access. Also, in order to find implications in terms of performance …
temporary link/server access. Also, in order to find implications in terms of performance …
Performability modelling of a Kerberos server with frequent key renewal under pseudo-secure conditions for increased security
This paper presents a modelling approach for performability evaluation of Kerberos servers
which dynamically renew keys under pseudo-secure conditions in order to significantly …
which dynamically renew keys under pseudo-secure conditions in order to significantly …
Analysing the combined kerberos timed authentication protocol and frequent key renewal using CSP and rank functions
Authentication mechanisms coupled with strong encryption techniques are used for network
security purposes; however, given sufficient time, well-equipped intruders are successful for …
security purposes; however, given sufficient time, well-equipped intruders are successful for …
[PDF][PDF] Challenges of Kerberos Variance with High QoS Expectations
This paper presents modelling approaches for performability evaluation of high Quality of
Service (QoS) of Kerberos servers which dynamically renew keys under pseudosecure …
Service (QoS) of Kerberos servers which dynamically renew keys under pseudosecure …
Analysing the Kerberos Timed Authentication Protocol Using CSP-Rank Functions
Y Kirsal, O Gemikonakli - Global Security, Safety, and Sustainability: 5th …, 2009 - Springer
Despite advances in network security, malicious attacks have shown a significant increase
in recent times. Authentication mechanisms coupled with strong encryption techniques are …
in recent times. Authentication mechanisms coupled with strong encryption techniques are …