With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
Web Navigation Prediction (WNP) has been popularly used for finding future probable web pages. Obtaining relevant information from a large web is challenging, as its size is growing with every second. Web data may con...
详细信息
Identifying drug–target interactions (DTIs) is a critical step in both drug repositioning. The labor-intensive, time-consuming, and costly nature of classic DTI laboratory studies makes it imperative to create effici...
详细信息
The growing realm of blockchain technology has captivated researchers and practitioners alike with its promise of decentralized, secure, and transparent transactions. This paper presents a comprehensive survey and ana...
详细信息
Enhancement of technology yields more complex time-dependent outcomes for better understanding and analysis. These outcomes generate more complex, unstable, and high-dimensional data from non-stationary environments. ...
详细信息
Video surveillance has played a pivotal role in ensuring the safety and security of the public across different sectors, including retail, transportation, and urban environments. Object detection (OD) in surveillance ...
详细信息
The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in *** malicious applications have become a serious concern to the...
详细信息
The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in *** malicious applications have become a serious concern to the security of Android *** address this problem,researchers have proposed several machine-learning models to detect and classify Android malware based on analyzing features extracted from Android ***,most existing studies have focused on the classification task and overlooked the feature selection process,which is crucial to reduce the training time and maintain or improve the classification *** current paper proposes a new Android malware detection and classification approach that identifies the most important features to improve classification performance and reduce training *** proposed approach consists of two main ***,a feature selection method based on the Attention mechanism is used to select the most important ***,an optimized Light Gradient Boosting Machine(LightGBM)classifier is applied to classify the Android samples and identify the *** feature selection method proposed in this paper is to integrate an Attention layer into a multilayer perceptron neural *** role of the Attention layer is to compute the weighted values of each feature based on its importance for the classification *** evaluation of the approach has shown that combining the Attention-based technique with an optimized classification algorithm for Android malware detection has improved the accuracy from 98.64%to 98.71%while reducing the training time from 80 to 28 s.
The rapid advancement of technology has given rise to medical cyber-physical systems (MCPS), a subset of cyber-physical systems (CPS) specifically tailored for patient care and healthcare providers. MCPS generate subs...
详细信息
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial succe...
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial success [1]. In spite of the steady improvement in efficiency, the interest and enthusiasm in search for new materials and innovative device architectures for newgeneration solar cells have never diminished or subsided;
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
详细信息
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data communication across various ***,IoT devices,typically low-powered,are susceptible to cyber ***,blockchain has emerged as a robust solution to secure these devices due to its decentralised ***,the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks,network scalability limitations,and blockchain-specific security ***,on the other hand,is a recently emerged information security solution that has great potential to secure low-powered IoT *** study aims to identify blockchain-specific vulnerabilities through changes in network behaviour,addressing a significant research gap and aiming to mitigate future cybersecurity *** blockchain and IoT technologies presents challenges,including performance bottlenecks,network scalability issues,and unique security *** paper analyses potential security weaknesses in blockchain and their impact on network *** developed a real IoT test system utilising three prevalent blockchain applications to conduct *** results indicate that Distributed Denial of Service(DDoS)attacks on low-powered,blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance,specifically:(1)an average increase in CPU core usage to 34.32%,(2)a reduction in hash rates by up to 66%,(3)an increase in batch timeout by up to 14.28%,and(4)an increase in block latency by up to 11.1%.These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
暂无评论