Review of Internet of Things (IoT) in electric power and energy systems
G Bedi, GK Venayagamoorthy, R Singh… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
A transformation is underway in electric power and energy systems (EPESs) to provide
clean distributed energy for sustainable global economic growth. Internet of Things (IoT) is at …
clean distributed energy for sustainable global economic growth. Internet of Things (IoT) is at …
Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
It is generally believed to be a tedious, time consuming, and error-prone process to develop
a virtual machine introspection (VMI) tool manually because of the semantic gap. Recent …
a virtual machine introspection (VMI) tool manually because of the semantic gap. Recent …
Stegotorus: a camouflage proxy for the tor anonymity system
Z Weinberg, J Wang, V Yegneswaran… - Proceedings of the …, 2012 - dl.acm.org
Internet censorship by governments is an increasingly common practice worldwide. Internet
users and censors are locked in an arms race: as users find ways to evade censorship …
users and censors are locked in an arms race: as users find ways to evade censorship …
Network flow watermarking attack on low-latency anonymous communication systems
X Wang, S Chen, S Jajodia - … on Security and Privacy (SP'07), 2007 - ieeexplore.ieee.org
Many proposed low-latency anonymous communication systems have used various flow
transformations such as traffic padding, adding cover traffic (or bogus packets), packet …
transformations such as traffic padding, adding cover traffic (or bogus packets), packet …
Hyperspectral time-series target detection based on spectral perception and spatial-temporal tensor decomposition
X Zhao, K Liu, K Gao, W Li - IEEE Transactions on Geoscience …, 2023 - ieeexplore.ieee.org
The detection of camouflaged targets in the complex background is a hot topic of current
research. The existing hyperspectral target detection algorithms do not take advantage of …
research. The existing hyperspectral target detection algorithms do not take advantage of …
Anonymous communications in mobile ad hoc networks
Due to the broadcast nature of radio transmissions, communications in mobile ad hoc
networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we …
networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we …
On flow correlation attacks and countermeasures in mix networks
In this paper, we address issues related to flow correlation attacks and the corresponding
countermeasures in mix networks. Mixes have been used in many anonymous …
countermeasures in mix networks. Mixes have been used in many anonymous …
[PDF][PDF] I2P data communication system
B Zantout, R Haraty - Proceedings of ICN, 2011 - csm.beirut.lau.edu.lb
As communication becomes more and more an integral part of our day to day lives, the need
to access information increases as well. Security is currently one of the most important …
to access information increases as well. Security is currently one of the most important …
Protecting IoT-environments against traffic analysis attacks with traffic morphing
I Hafeez, M Antikainen… - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
Traffic analysis attacks allow an attacker to infer sensitive information about users by
analyzing network traffic of user devices. These attacks are passive in nature and are difficult …
analyzing network traffic of user devices. These attacks are passive in nature and are difficult …