Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (3)
- Computer Engineering (2)
- Digital Communications and Networking (2)
- Electrical and Computer Engineering (2)
- Engineering (2)
-
- Information Security (2)
- Artificial Intelligence and Robotics (1)
- Arts and Humanities (1)
- Categorical Data Analysis (1)
- Catholic Studies (1)
- Christianity (1)
- Databases and Information Systems (1)
- Electrical and Electronics (1)
- Religion (1)
- Statistics and Probability (1)
- Systems and Communications (1)
- Theory and Algorithms (1)
- Keyword
-
- Security (2)
- AVISPA (1)
- Age groups (1)
- Atheism (1)
- Authentication (1)
-
- Behavior (1)
- Catholicism (1)
- Christianity (1)
- Classification (1)
- Clustering (1)
- Computer information security (1)
- Computer security (1)
- Computers (1)
- Cross-cultural studies (1)
- Datasets (1)
- Decision trees (1)
- Edge computing (1)
- Emotions (1)
- Exploration (1)
- Factor analysis (1)
- Gender (1)
- Internet of Things (IoT) (1)
- Internet of medical things (IoMT) (1)
- Internet of things (Iot) (1)
- Invariance (1)
- IoT malware (1)
- Key mangement (1)
- Machine learning (1)
- Malware detection (1)
- Methods (1)
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
VMASC Publications
The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, …
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
VMASC Publications
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication …
Transfer Learning For Detecting Unknown Network Attacks, Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles Kamhoua, Kevin Kwiat
Transfer Learning For Detecting Unknown Network Attacks, Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles Kamhoua, Kevin Kwiat
VMASC Publications
Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the network behaviors and training a classification model. These models usually require large labeled datasets; however, the rapid pace and unpredictability of cyber attacks make this labeling impossible in real time. To address these problems, we proposed utilizing transfer learning for detecting new and unseen attacks by transferring the knowledge of the known attacks. In our previous work, we have proposed a transfer learning-enabled framework and approach, called HeTL, which can find the common …
Dimensionality And Factorial Invariance Of Religiosity Among Christians And The Religiously Unaffiliated: A Cross-Cultural Analysis Based On The International Social Survey Programme, Carlos Miguel Lemos, Ross Joseph Gore, Ivan Puga-Gonzalez, F. Leron Shults
Dimensionality And Factorial Invariance Of Religiosity Among Christians And The Religiously Unaffiliated: A Cross-Cultural Analysis Based On The International Social Survey Programme, Carlos Miguel Lemos, Ross Joseph Gore, Ivan Puga-Gonzalez, F. Leron Shults
VMASC Publications
We present a study of the dimensionality and factorial invariance of religiosity for 26 countries with a Christian heritage, based on the 1998 and 2008 rounds of the International Social Survey Programme (ISSP) Religion survey, using both exploratory and multi-group confirmatory factor analyses. The results of the exploratory factor analysis showed that three factors, common to Christian and religiously unaffiliated respondents, could be extracted from our initially selected items and suggested the testing of four different three-factor models using multi-group confirmatory factor analysis. For the model with the best fit and measurement invariance properties, we labeled the three resulting factors …