Review of Internet of Things (IoT) in electric power and energy systems

G Bedi, GK Venayagamoorthy, R Singh… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
A transformation is underway in electric power and energy systems (EPESs) to provide
clean distributed energy for sustainable global economic growth. Internet of Things (IoT) is at …

Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection

Y Fu, Z Lin - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
It is generally believed to be a tedious, time consuming, and error-prone process to develop
a virtual machine introspection (VMI) tool manually because of the semantic gap. Recent …

Stegotorus: a camouflage proxy for the tor anonymity system

Z Weinberg, J Wang, V Yegneswaran… - Proceedings of the …, 2012 - dl.acm.org
Internet censorship by governments is an increasingly common practice worldwide. Internet
users and censors are locked in an arms race: as users find ways to evade censorship …

Network flow watermarking attack on low-latency anonymous communication systems

X Wang, S Chen, S Jajodia - … on Security and Privacy (SP'07), 2007 - ieeexplore.ieee.org
Many proposed low-latency anonymous communication systems have used various flow
transformations such as traffic padding, adding cover traffic (or bogus packets), packet …

Hyperspectral time-series target detection based on spectral perception and spatial-temporal tensor decomposition

X Zhao, K Liu, K Gao, W Li - IEEE Transactions on Geoscience …, 2023 - ieeexplore.ieee.org
The detection of camouflaged targets in the complex background is a hot topic of current
research. The existing hyperspectral target detection algorithms do not take advantage of …

Anonymous communications in mobile ad hoc networks

Y Zhang, W Liu, W Lou - … IEEE 24th Annual Joint Conference of …, 2005 - ieeexplore.ieee.org
Due to the broadcast nature of radio transmissions, communications in mobile ad hoc
networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we …

On flow correlation attacks and countermeasures in mix networks

Y Zhu, X Fu, B Graham, R Bettati, W Zhao - … Enhancing Technologies: 4th …, 2005 - Springer
In this paper, we address issues related to flow correlation attacks and the corresponding
countermeasures in mix networks. Mixes have been used in many anonymous …

[PDF][PDF] I2P data communication system

B Zantout, R Haraty - Proceedings of ICN, 2011 - csm.beirut.lau.edu.lb
As communication becomes more and more an integral part of our day to day lives, the need
to access information increases as well. Security is currently one of the most important …

[PDF][PDF] A survey of anonymous communication channels

G Danezis, C Diaz - 2008 - Citeseer
We present an overview of the field of anonymous communications, from its establishment in
1981 from David Chaum to today. Key systems are presented categorized according to their …

Protecting IoT-environments against traffic analysis attacks with traffic morphing

I Hafeez, M Antikainen… - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
Traffic analysis attacks allow an attacker to infer sensitive information about users by
analyzing network traffic of user devices. These attacks are passive in nature and are difficult …