The benefits of the Internet of Medical Things (IoMT) in providing seamless healthcare to the world are at the forefront of technological advancement. However, security concerns of any IoMT systems are high since they...
详细信息
The benefits of the Internet of Medical Things (IoMT) in providing seamless healthcare to the world are at the forefront of technological advancement. However, security concerns of any IoMT systems are high since they threaten to compromise personal information of patients and can even cause health hazards. Researchers are exploring the use of various techniques to ensure a high level of security of IoMT systems. One key concern is that the computing power of any Internet of Things (IoT) device is relatively low, hence mechanisms that require low computational power are appropriate for designing Intrusion Detection Systems (IDS). In this research work, a blockchain IDS coalition is proposed for securing IoMT networks and devices. The blockchain ledger is compact and uses less processing resources. Additionally, the ledger requires less communication overhead. The cryptographic hashes in the suggested architecture ensure complete data secrecy and integrity between parties who are trusted and those who are untrustworthy. Peer-to-peer networks in both central and cluster networks are also included in this work for complete decentralization. The proposed model can counter various attacks, including Denial of Service (DoS), anonymity attacks, impersonation attacks, Man-In-The-Middle (MITM), and Cross-Site Scripting (XSS). The proposed method achieved an F1- score as high as 100% and reported an AUC value of over 99%. IEEE
Autonomous drones and deep learning neural networks are becoming popular tools to revolutionize aircraft operations by partially automating visual inspection processes in aircraft maintenance. The research aims to pro...
详细信息
Shunt is a flexible tube called a catheter implanted inside the brain where cerebrospinal fluid (CSF) is produced. Existing treatments rely on passive implantable shunts with differential pressure valves. The authors ...
详细信息
To reduce the current crisis on energy and environmental problems, the adoption of electric vehicles is an effective way. But limited access and availability of charging infrastructure are restricting the EV market de...
详细信息
Soft actuators have many advantages, such as flexibility and safe interaction with the environment. Despite these advantages, they still lack the stiffness to carry the high load. The layer jamming mechanism can be ap...
详细信息
L10-FePt-type bit-patterned media has provided a promising alternative for ultrahigh-density magnetic recording systems in the current digital era, but rapid fabrication of magnetic patterns with hyperfine bit islands...
详细信息
L10-FePt-type bit-patterned media has provided a promising alternative for ultrahigh-density magnetic recording systems in the current digital era, but rapid fabrication of magnetic patterns with hyperfine bit islands is still challenging, especially with the target for miniaturization and scalable production simultaneously. Herein, Fe,Pt-containing block copolymers were utilized as single-source precursors for solution-processable patterning and subsequent generation of the demanding magnetic FePt dots by in situ pyrolysis. High-throughput nanoimprint lithography was initially employed to fabricate the predefined bit cells precisely,and then the intrinsic self-assembly of phase-separated block copolymers further drove the formation of accurate bit *** from the synergistic effect of top-down lithographic approach and bottom-up self-assembly, the customizable patterns could be achieved for large-scale mass production in targeted areas, but high-density isolated dots could also be accurately aligned along the patterned features after subsequent self-assembly. This reliable strategy would provide a good avenue to precisely construct ultrahigh-density magnetic data storage devices.
An efficient machine learning (ML) ensemble technique for categorizing Intrusion Detection (ID) is proposed in this study. The tuning of the ML model’s parameters is a critical topic since it can improve detection qu...
详细信息
Recently,an innovative trend like cloud computing has progressed quickly in *** a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers...
详细信息
Recently,an innovative trend like cloud computing has progressed quickly in *** a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service *** cloud computing environment extracts the execution details of services and systems from end-users and ***,through the system’s virtualization accomplished using resource pooling,cloud computing resources become more *** attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments is described in this *** the help of multi-agents,we attempt to represent Open-Identity(ID)design to find a solution that would offer trustworthy and secured authentication and authorization services to software services based on the *** research aims to determine how authentication and authorization services were provided in an agreeable and preventive *** on attack-oriented threat model security,the evaluation *** considering security for both authentication and authorization systems,possible security threats are analyzed by the proposed security systems.
We are now living in the era of big data thanks to technological innovation. It is very important to discover valuable information in massive data. High utility itemset mining and frequent itemset mining are commonly ...
详细信息
暂无评论