Recently, smart contracts were introduced as a necessity to automatically execute specific operations within blockchain systems. The popularity and diversity of blockchain systems attracted intensive attentions from a...
详细信息
The fast generation speed and large volume of time series data make the efficient storage and transmission of time series challenging. In addition, time series is also characterized by instability, however, many advan...
详细信息
Skin cancer is considered one of the most fatal illnesses in the human population. Within the current healthcare system, the procedure of identifying skin cancer is time-consuming and poses a potential risk to human l...
详细信息
WSN security is a current area of research for many scientists. One of the best security tools for defending the network from malicious assaults or the unauthenticated access is IDS. In this article, we suggest an opt...
详细信息
The modern power system has evolved into a cyber-physical system with deep coupling of physical and information domains,which brings new security *** at the problem that the“information-physical”cross-domain attacks...
详细信息
The modern power system has evolved into a cyber-physical system with deep coupling of physical and information domains,which brings new security *** at the problem that the“information-physical”cross-domain attacks with key nodes as springboards seriously threaten the safe and stable operation of power grids,a risk propagation model considering key nodes of power communication coupling networks is proposed to study the risk propagation characteristics of malicious attacks on key nodes and the impact on the ***,combined with the complex network theory,a topological model of the power communication coupling network is established,and the key nodes of the coupling network are screened out by Technique for Order Preference by Similarity to Ideal Solution(TOPSIS)method under the comprehensive evaluation index based on topological characteristics and physical ***,a risk propagation model is established for malicious attacks on key nodes to study its propagation characteristics and analyze the state changes of each node in the coupled ***,two loss-causing factors:the minimum load loss ratio and transmission delay factor are constructed to quantify the impact of risk propagation on the coupled ***,simulation analysis based on the IEEE 39-node system shows that the probability of node being breached(α)and the security tolerance of the system(β)are the key factors affecting the risk propagation characteristics of the coupled network,as well as the criticality of the node is positively correlated with the damage-causing *** proposed methodological model can provide an effective exploration of the diffusion of security risks in control systems on a macro level.
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable...
详细信息
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable insights into user behavior, environmental conditions, and other important factors. However, as this data is collected and processed by cloud-hosted services, there is a growing concern about privacy and security. Without adequate protection, sensitive information could be exposed to hackers or other malicious actors, putting both individuals and organizations at risk. To address this challenge, real-time privacy-preserving techniques can be used to protect IoT data without compromising its value. This paper introduces an efficient Real-time privacy-preserving scheme (RT-PPS) for cloud-hosted IoT data. RT-PPS employs multi-authority attribute-based encryption on a hybrid cloud environment to keep data secure and private, while still allowing it to be processed and analyzed by cloud-hosted services. RT-PPS has efficient response time and resource consumption, which gives it the ability to handle a huge number of concurrent users at the same time without notable delay. The proposed RT-PPS has been validated through extensive experimental evaluation on a variety of configurations. Moreover, the proposed scheme has been computationally compared with the state-of-the-artwork. RT-PPS has shown excellent performance, effectiveness, and efficiency. The RT-PPS encryption time for a 1 GB dataset while considering 1024 slices is approximately 1000 ms. Also, the RT-PPS decryption time for a 1 GB ciphertext while considering 1024 slices are approximately 235 ms. Finally, RT-PPS is proven secure against any polynomial-time attacks and their variations that have at most a negligible advantage in the introduced security model. Moreover compared to most of the state-of-the-artwork, RT-PPS reduced the ciphertext size and lowered the computations in the encryption, key g
Integrating factual information from knowledge graphs (KGs) into large language models (LLMs) has emerged as a promising approach to mitigate hallucination issues inherent in LLMs. This augmentation not only addresses...
详细信息
In this paper, two technologies of metamaterial for microwave wireless power transfer are shown. One is a zeroth-order resonance for a microwave snow melting system, and another one is a focusing reflector for realizi...
详细信息
Enterprise Resource Planning(ERP)software is extensively used for the management of business *** offers a system of integrated applications with a shared central *** all business-critical information in a central plac...
详细信息
Enterprise Resource Planning(ERP)software is extensively used for the management of business *** offers a system of integrated applications with a shared central *** all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure,which makes the database *** paper investigates database and Blockchain integration,where the Blockchain network works in synchronization with the database system,and offers a mechanism to validate the transactions and ensure data *** research exists on Blockchain-based solutions for the single point of failure in *** established in our study that for concurrent access control andmonitoring of ERP,private permissioned Blockchain using Proof of Elapsed Time consensus is more *** study also investigated the bottleneck issue of transaction processing rates(TPR)of Blockchain consensus,specifically ERP’s *** paper presents systemarchitecture that integrates Blockchain with an ERP system using an application interface.
The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability t...
详细信息
The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus ***,the study suggests using an advanced approach that utilizes machine learning,specifically the Wide Residual Network(WRN),to identify hidden malware in IoT *** research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices,using the MalMemAnalysis ***,thorough experimentation provides evidence for the effectiveness of the WRN-based strategy,resulting in exceptional performance measures such as accuracy,precision,F1-score,and *** study of the test data demonstrates highly impressive results,with a multiclass accuracy surpassing 99.97%and a binary class accuracy beyond 99.98%.The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT ***,a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested *** research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT ***,it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world *** WRN offers benefits in managing the intricacies of malware detection,emphasizing its capacity to enhance the security of IoT *** summarize,this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning *** research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance *** research co
暂无评论