Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (623)
- Information Security (243)
- Engineering (120)
- Computer Engineering (78)
- Social and Behavioral Sciences (76)
-
- Electrical and Computer Engineering (53)
- Databases and Information Systems (40)
- Medicine and Health Sciences (36)
- Software Engineering (36)
- Business (31)
- Artificial Intelligence and Robotics (29)
- OS and Networks (25)
- Public Affairs, Public Policy and Public Administration (24)
- Law (23)
- Systems Architecture (21)
- Sociology (14)
- Education (13)
- Other Computer Sciences (13)
- Computer Law (12)
- Defense and Security Studies (12)
- Technology and Innovation (12)
- Health Information Technology (11)
- Legal Studies (11)
- Theory and Algorithms (11)
- Arts and Humanities (10)
- Communication (10)
- Environmental Sciences (10)
- Forensic Science and Technology (10)
- Science and Technology Studies (10)
- Institution
-
- Edith Cowan University (102)
- Dartmouth College (54)
- Singapore Management University (51)
- Selected Works (41)
- Old Dominion University (31)
-
- Brigham Young University (22)
- University of Wollongong (20)
- Missouri University of Science and Technology (18)
- Nova Southeastern University (16)
- Syracuse University (15)
- University of South Florida (14)
- TÜBİTAK (13)
- Embry-Riddle Aeronautical University (11)
- Zayed University (11)
- Kennesaw State University (10)
- University of Nebraska at Omaha (10)
- Marquette University (9)
- Purdue University (9)
- Walden University (9)
- University of Arkansas, Fayetteville (8)
- Wright State University (8)
- City University of New York (CUNY) (7)
- University for Business and Technology in Kosovo (7)
- University of Texas at Arlington (7)
- Florida International University (6)
- University of Nebraska - Lincoln (6)
- University of New Haven (6)
- SelectedWorks (5)
- Technological University Dublin (5)
- University of Kentucky (5)
- Publication Year
- Publication
-
- Dartmouth Scholarship (48)
- Australian Information Security Management Conference (45)
- Research Collection School Of Computing and Information Systems (44)
- Theses and Dissertations (27)
- CCE Theses and Dissertations (16)
-
- USF Tampa Graduate Theses and Dissertations (14)
- Electrical Engineering and Computer Science - All Scholarship (13)
- Faculty of Informatics - Papers (Archive) (13)
- Turkish Journal of Electrical Engineering and Computer Sciences (13)
- Research outputs pre 2011 (12)
- VMASC Publications (12)
- All Works (11)
- Computer Science Faculty Research & Creative Works (11)
- Computer Science Faculty Publications (10)
- Professor Katina Michael (10)
- Dissertations (9)
- Electronic Theses and Dissertations (9)
- Walden Dissertations and Doctoral Studies (9)
- Australian Digital Forensics Conference (8)
- Browse all Theses and Dissertations (8)
- Graduate Theses and Dissertations (8)
- Research outputs 2014 to 2021 (8)
- UBT International Conference (7)
- Australian Information Warfare and Security Conference (6)
- Australian Security and Intelligence Conference (6)
- Doctoral Dissertations (6)
- Electrical & Computer Engineering and Computer Science Faculty Publications (6)
- FIU Electronic Theses and Dissertations (6)
- Research outputs 2022 to 2026 (6)
- Associate Professor Katina Michael (5)
- Publication Type
- File Type
Articles 1 - 30 of 684
Full-Text Articles in Physical Sciences and Mathematics
A Secure And Effective Framework For Key Concept Mining From Educational Content Using Large Language Models, Ashika Sameem Abdul Rasheed
A Secure And Effective Framework For Key Concept Mining From Educational Content Using Large Language Models, Ashika Sameem Abdul Rasheed
Thesis/ Dissertation Defenses
This thesis examines the use of Large Language Models (LLMs) in education, with a focus on improving performance and implementing strong security measures. The research has two main goals, namely, the development of an effective lecture summarization technique using LLMs and identifying and addressing security vulnerabilities in LLM applications according to OWASP (Open Web Application Security Project) guidelines. For the former goal, we have proposed an effective framework for fine-tuning LLMs using real lecture datasets and compared the performance of different LLMs. For the latter goal, we conducted a thorough review of the application dataflow of the proposed framework and …
A Novel Algorithmic Approach To Safeguarding Inter-Vehicular Communications And Privacy, Susan Zehra
A Novel Algorithmic Approach To Safeguarding Inter-Vehicular Communications And Privacy, Susan Zehra
Graduate Student Government Association Research Conference
Vehicular networks have become a crucial technology for implementing various safety applications for both drivers and passengers. These networks are currently receiving significant attention due to their ability to facilitate access to a diverse range of ubiquitous services. However, the growing popularity of vehicular networks has also led to an increase in security vulnerabilities within their inter-vehicular services and communications, resulting in a rise in security attacks and threats.
Ensuring the security of vehicular networks is paramount, as their deployment should not compromise the safety and privacy of stakeholders. Effectively defending against a broad spectrum of attacks necessitates the development …
Permission Recommendation For Android Applications: Leveraging Natural Language Processing On App Descriptions, Saeed Salem Al Shebli
Permission Recommendation For Android Applications: Leveraging Natural Language Processing On App Descriptions, Saeed Salem Al Shebli
Thesis/ Dissertation Defenses
This study develops an NLP-based system to recommend essential permissions for Android apps by analyzing app descriptions. It leverages advanced models, including LSTM and ensemble techniques, to align permissions with app functionality while minimizing unnecessary requests.
Exploring The Integration Of Blockchain In Iot Use Cases: Challenges And Opportunities, Ivannah George
Exploring The Integration Of Blockchain In Iot Use Cases: Challenges And Opportunities, Ivannah George
Electronic Theses, Projects, and Dissertations
Blockchain and The Internet of Things (IoT) is a significant paradigm which has gained traction in today’s digital age as two complimentary technologies. The combination of IoT's connectivity with blockchain's security creates new opportunities and solves problems associated with centralized systems. This culminating project aims to delve deeper into the integration of blockchain technology in IoT applications based on select use cases to uncover potential benefits and significant challenges of blockchain integration across different sectors. The research objectives to be addressed are: (RO1) How emerging vulnerabilities manifest in the implementation of blockchain within current IoT ecosystems. (RO2) How current opportunities …
Securing Body Area Networks With Fingerprint Cryptography And Authentication In Manet, Alaa M. Elbanaa, Roayat Ismail Abdelfatah, Mohamed E. Nasr
Securing Body Area Networks With Fingerprint Cryptography And Authentication In Manet, Alaa M. Elbanaa, Roayat Ismail Abdelfatah, Mohamed E. Nasr
Journal of Engineering Research
Standard MANETs face issues like incorrect transmission and vulnerability to unauthorized node access, posing significant security concerns, especially regarding authentication procedures. To address these challenges, researchers are exploring innovative approaches to enhance authentication mechanisms within MANETs. In this paper, we present a novel solution integrating a Body Area Network (BAN) scheme to capture biomedical data from sensors such as ECG and EEG, facilitating data transmission across MANETs. Furthermore, we employ a hybrid Elgamal algorithm for encrypting biomedical data, bolstered by fingerprint biometrics to fortify the cryptographic process, enhancing network security. Additionally, we conduct comparative analyses, exploring different key sizes and …
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats And Defenses, Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats And Defenses, Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed
Computer Science: Faculty Publications and Other Works
Deep learning methods have gained increasing attention in various applications due to their outstanding performance. For exploring how this high performance relates to the proper use of data artifacts and the accurate problem formulation of a given task, interpretation models have become a crucial component in developing deep learning-based systems. Interpretation models enable the understanding of the inner workings of deep learning models and offer a sense of security in detecting the misuse of artifacts in the input data. Similar to prediction models, interpretation models are also susceptible to adversarial inputs. This work introduces two attacks, AdvEdge and AdvEdge + …
Contextualizing Interpersonal Data Sharing In Smart Homes, Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, David Kotz
Contextualizing Interpersonal Data Sharing In Smart Homes, Weijia He, Nathan Reitinger, Atheer Almogbil, Yi-Shyuan Chiang, Timothy J. Pierson, David Kotz
Dartmouth Scholarship
A key feature of smart home devices is monitoring the environment and recording data. These devices provide security via motion-detection video alerts, cost-savings via thermostat usage history, and peace of mind via functions like auto-locking doors or water leak detectors. At the same time, the sharing of this information in interpersonal relationships---though necessary---is currently accomplished on an all-or-nothing basis. This can easily lead to oversharing in a multi-user environment. Although prior work has studied people's perceptions of information sharing with vendors or ISPs, the sharing of household data among users who interact personally is less well understood. Interpersonal situations make …
The Next Strike: Pioneering Forward-Thinking Attack Techniques With Rowhammer In Dram Technologies, Nakul Kochar
The Next Strike: Pioneering Forward-Thinking Attack Techniques With Rowhammer In Dram Technologies, Nakul Kochar
Theses
In the realm of DRAM technologies this study investigates RowHammer vulnerabilities in DDR4 DRAM memory across various manufacturers, employing advanced multi-sided fault injection techniques to impose attack strategies directly on physical memory rows. Our novel approach, diverging from traditional victim-focused methods, involves strategically allocating virtual memory rows to their physical counterparts for more potent attacks. These attacks, exploiting the inherent weaknesses in DRAM design, are capable of inducing bit flips in a controlled manner to undermine system integrity. We employed a strategy that compromised system integrity through a nuanced approach of targeting rows situated at a distance of two rows …
Measuring Confidentiality With Multiple Observables, John J. Utley
Measuring Confidentiality With Multiple Observables, John J. Utley
Computer Science Senior Theses
Measuring the confidentiality of programs that need to interact with the outside world can prevent leakages and is important to protect against dangerous attacks. However, information propagation is difficult to follow through a large program with implicit information flow, tricky loops, and complicated instructions. Previous works have tackled this problem in several ways but often measure leakage a program has on average rather than the leakage produced by a set of particularly compromising interactions. We introduce new methods that target a specific set of observables revealed throughout execution to cut down on the resources needed for analysis. Our implementation examines …
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Theses/Capstones/Creative Projects
Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …
Attribute-Hiding Fuzzy Encryption For Privacy-Preserving Data Evaluation, Zhenhua Chen, Luqi Huang, Guomin Yang, Willy Susilo, Xingbing Fu, Xingxing Jia
Attribute-Hiding Fuzzy Encryption For Privacy-Preserving Data Evaluation, Zhenhua Chen, Luqi Huang, Guomin Yang, Willy Susilo, Xingbing Fu, Xingxing Jia
Research Collection School Of Computing and Information Systems
Privacy-preserving data evaluation is one of the prominent research topics in the big data era. In many data evaluation applications that involve sensitive information, such as the medical records of patients in a medical system, protecting data privacy during the data evaluation process has become an essential requirement. Aiming at solving this problem, numerous fuzzy encryption systems for different similarity metrics have been proposed in literature. Unfortunately, the existing fuzzy encryption systems either fail to achieve attribute-hiding or achieve it, but are impractical. In this paper, we propose a new fuzzy encryption scheme for privacy-preserving data evaluation based on overlap …
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Computer Science Faculty Publications
Program completion is a translation from the language of logic programs into the language of first-order theories. Its original definition has been extended to programs that include integer arithmetic, accept input, and distinguish between output predicates and auxiliary predicates. For tight programs, that generalization of completion is known to match the stable model semantics, which is the basis of answer set programming. We show that the tightness condition in this theorem can be replaced by a less restrictive “local tightness” requirement. From this fact we conclude that the proof assistant ANTHEM-P2P can be used to verify equivalence between locally tight …
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Locally Tight Programs, Jorge Fandinno, Vladimir Lifschitz, Nathan Temple
Computer Science Faculty Publications
Program completion is a translation from the language of logic programs into the language of first-order theories. Its original definition has been extended to programs that include integer arithmetic, accept input, and distinguish between output predicates and auxiliary predicates. For tight programs, that generalization of completion is known to match the stable model semantics, which is the basis of answer set programming. We show that the tightness condition in this theorem can be replaced by a less restrictive “local tightness” requirement. From this fact we conclude that the proof assistant ANTHEM-P2P can be used to verify equivalence between locally tight …
Autonomous Strike Uavs In Support Of Homeland Security Missions: Challenges And Preliminary Solutions, Meshari Aljohani, Ravi Mukkamala, Stephan Olariu
Autonomous Strike Uavs In Support Of Homeland Security Missions: Challenges And Preliminary Solutions, Meshari Aljohani, Ravi Mukkamala, Stephan Olariu
Computer Science Faculty Publications
Unmanned Aerial Vehicles (UAVs) are becoming crucial tools in modern homeland security applications, primarily because of their cost-effectiveness, risk reduction, and ability to perform a wider range of activities. This study focuses on the use of autonomous UAVs to conduct, as part of homeland security applications, strike missions against high-value terrorist targets. Owing to developments in ledger technology, smart contracts, and machine learning, activities formerly carried out by professionals or remotely flown UAVs are now feasible. Our study provides the first in-depth analysis of the challenges and preliminary solutions for the successful implementation of an autonomous UAV mission. Specifically, we …
Designing A Blockchain-Empowered Telehealth Artifact For Decentralized Identity Management And Trustworthy Communication: Interdisciplinary Approach, Xueping Liang, Nabid Alam, Tahmina Sultana, Eranga Bandara, Sachin Shetty
Designing A Blockchain-Empowered Telehealth Artifact For Decentralized Identity Management And Trustworthy Communication: Interdisciplinary Approach, Xueping Liang, Nabid Alam, Tahmina Sultana, Eranga Bandara, Sachin Shetty
VMASC Publications
Background: Telehealth played a critical role during the COVID-19 pandemic and continues to function as an essential component of health care. Existing platforms cannot ensure privacy and prevent cyberattacks.
Objective: The main objectives of this study are to understand existing cybersecurity issues in identity management and trustworthy communication processes in telehealth platforms and to design a software architecture integrated with blockchain to improve security and trustworthiness with acceptable performance.
Methods: We improved personal information security in existing telehealth platforms by adopting an innovative interdisciplinary approach combining design science, social science, and computer science in the health care domain, with prototype …
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
VMASC Publications
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …
Trusted Digital Twin Network For Intelligent Vehicles, Asad Malik, Ayan Roy, Sanjay Madria
Trusted Digital Twin Network For Intelligent Vehicles, Asad Malik, Ayan Roy, Sanjay Madria
Computer Science Faculty Research & Creative Works
Vehicle-to-vehicle (V2V) infrastructure facilitates wireless communication among vehicles within close proximity. This allows sharing of contextual information such as speed, location, direction, traffic, route closures, human behavior mental conditions to improve traffic flow, reduce collisions, and enhance safety on the road. However, the assumption of honest peers along with the over-reliability on the information shared in the network can pose a serious threat to human safety. A digital twin is a concept that enables a system to develop a virtual environment that mimics the real-life scenario for any situation. The availability of powerful computing equipment inside vehicles can be leveraged …
On Vulnerabilities Of Building Automation Systems, Michael Cash
On Vulnerabilities Of Building Automation Systems, Michael Cash
Graduate Thesis and Dissertation 2023-2024
Building automation systems (BAS) have become more commonplace in personal and commercial environments in recent years. They provide many functions for comfort and ease of use, from automating room temperature and shading, to monitoring equipment data and status. Even though their convenience is beneficial, their security has become an increased concerned in recent years. This research shows an extensive study on building automation systems and identifies vulnerabilities in some of the most common building communication protocols, BACnet and KNX. First, we explore the BACnet protocol, exploring its Standard BACnet objects and properties. An automation tool is designed and implemented to …
Mobilytics: Mobility Analytics Framework For Transferring Semantic Knowledge, Shreya Ghosh, Soumya K. Ghosh, Sajal K. Das, Prasenjit Mitra
Mobilytics: Mobility Analytics Framework For Transferring Semantic Knowledge, Shreya Ghosh, Soumya K. Ghosh, Sajal K. Das, Prasenjit Mitra
Computer Science Faculty Research & Creative Works
The proliferation of sensor-equipped smartphones has led to the generation of vast amounts of GPS data, such as timestamped location points, enabling a range of location-based services. However, deciphering the spatio-temporal dynamics of mobility to understand the underlying motivations behind travel patterns presents a significant challenge. his paper focuses on how individuals' GPS traces (latitude, longitude, timestamp) interpret the connection and correlations among different entities such as people, locations or point-of-interests (POIs), and semantic contexts (trip-purpose). We introduce a mobility analytics framework, named Mobilytics designed to identify trip purposes from individual GPS traces by leveraging a “mobility knowledge graph” (MKG) …
Secure And Privacy-Preserving Federated Learning With Rapid Convergence In Leo Satellite Networks, Mohamed Elmahallawy
Secure And Privacy-Preserving Federated Learning With Rapid Convergence In Leo Satellite Networks, Mohamed Elmahallawy
Doctoral Dissertations
"The advancement of satellite technology has enabled the launch of small satellites equipped with high-resolution cameras into low Earth orbit (LEO), enabling the collection of extensive Earth data for training AI models. However, the conventional approach of downloading satellite-related data to a ground station (GS) for training a centralized machine learning (ML) model faces significant challenges. Firstly, the transmission of raw data raises security and privacy concerns, especially in military applications. Secondly, the download bandwidth is limited, which puts a stringent limit on image transmissions to the GS. Lastly, LEO satellites have sporadic visibility with the GS, and orbit the …
Stealthy Backdoor Attack For Code Models, Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo
Stealthy Backdoor Attack For Code Models, Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, David Lo
Research Collection School Of Computing and Information Systems
Code models, such as CodeBERT and CodeT5, offer general-purpose representations of code and play a vital role in supporting downstream automated software engineering tasks. Most recently, code models were revealed to be vulnerable to backdoor attacks. A code model that is backdoor-attacked can behave normally on clean examples but will produce pre-defined malicious outputs on examples injected with that activate the backdoors. Existing backdoor attacks on code models use unstealthy and easy-to-detect triggers. This paper aims to investigate the vulnerability of code models with backdoor attacks. To this end, we propose A (dversarial eature as daptive Back). A achieves stealthiness …
Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley
Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley
Theses: Doctorates and Masters
Understanding attitudes towards privacy and surveillance technologies used to enhance security objectives is a complex, but crucial aspect for policy makers to consider. Historically, terrorism-related incidents justified the uptake of surveillance practices. More recently however, biosecurity concerns have motivated nation-states to adopt more intrusive surveillance measures. There is a growing body of literature that supports the public’s desire to maintain privacy despite fears of biological or physical threats.
This research set out to explore attitudes towards privacy and surveillance in an Australian context. Throughout the course of this endeavour, the COVID-19 pandemic emerged bringing with it a variety of track …
A Secure And Privacy-Preserving Signature Protocol Using Quantum Teleportation In Metaverse Environment, Pankaj Kumar, Vivek Bharmaik, Sunil Prajapat, Garima Thakur, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues
A Secure And Privacy-Preserving Signature Protocol Using Quantum Teleportation In Metaverse Environment, Pankaj Kumar, Vivek Bharmaik, Sunil Prajapat, Garima Thakur, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues
VMASC Publications
The burgeoning concept of the metaverse as an interconnected virtual space represents the forefront of the next-generation internet. Quantum teleportation, known for its prowess in ensuring secure and reliable communications, stands poised to revolutionize interactions within this immersive digital realm. In this context, we propose a comprehensive interaction protocol tailored for the metaverse environment. The designed protocol entails two fundamental components: first, the interaction between a user and their avatar, facilitated by a secure seven-qubit entangled state; and second, the interaction between two avatars, enabled through an efficient two-qubit entangled state. To fortify the protocol’s resilience, quantum key distribution (QKD) …
Secure Location-Based Authenticated Key Establishment Scheme For Maritime Communication, Saurabh Agrawal, Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, Sachin Shetty, Sajal K. Das
Secure Location-Based Authenticated Key Establishment Scheme For Maritime Communication, Saurabh Agrawal, Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, Sachin Shetty, Sajal K. Das
Computer Science Faculty Research & Creative Works
Maritime communication helps vessels and ports plan their movements, exchange environmental information, and communicate among themselves. The vessels' movement and changing location are critical to keep them secure from data interception and data tampering by unauthorized parties during transmission. To secure maritime communication, we propose a novel lightweight authentication scheme sensitive to the current ship location. We assess the effectiveness of the proposed protocol in defending against a range of security threats while keeping communication and computation costs low and meeting the desired security and functional requirements of anonymity and untraceability. The detailed security analysis using the widely accepted Scyther …
A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson
A Systematic Review Of K-12 Cybersecurity Education Around The World, Ahmed Ibrahim, Marnie Mckee, Leslie F. Sikos, Nicola F. Johnson
Research outputs 2022 to 2026
This paper presents a systematic review of K-12 cybersecurity education literature from around the world. 24 academic papers dated from 2013-2023 were eligible for inclusion in the literature established within the research protocol. An additional 19 gray literature sources comprised the total. A range of recurring common topics deemed as aspects of cybersecurity behavior or practice were identified. A variety of cybersecurity competencies and skills are needed for K-12 students to apply their knowledge. As may be expected to be the case with interdisciplinary fields, studies are inherently unclear in the use of their terminology, and this is compounded in …
Unleashing The Power Of Internet Of Things And Blockchain: A Comprehensive Analysis And Future Directions, Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci
Unleashing The Power Of Internet Of Things And Blockchain: A Comprehensive Analysis And Future Directions, Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci
Research outputs 2022 to 2026
As the fusion of the Internet of Things (IoT) and blockchain technology advances, it is increasingly shaping diverse fields. The potential of this convergence to fortify security, enhance privacy, and streamline operations has ignited considerable academic interest, resulting in an impressive body of literature. However, there is a noticeable scarcity of studies employing Latent Dirichlet Allocation (LDA) to dissect and categorize this field. This review paper endeavours to bridge this gap by meticulously analysing a dataset of 4455 journal articles drawn solely from the Scopus database, cantered around IoT and blockchain applications. Utilizing LDA, we have extracted 14 distinct topics …
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
Theses and Dissertations
In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital …
A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong
A Reliable And Secure Mobile Cyber-Physical Digital Microfluidic Biochip For Intelligent Healthcare, Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong
Research Collection School Of Computing and Information Systems
Digital microfluidic, as an emerging and potential technology, diversifies the biochemical applications platform, such as protein dilution sewage detection. At present, a vast majority of universal cyberphysical digital microfluidic biochips (DMFBs) transmit data through wires via personal computers and microcontrollers (like Arduino), consequently, susceptible to various security threats and with the popularity of wireless devices, losing competitiveness gradually. On the premise that security be ensured first and foremost, calls for wireless portable, safe, and economical DMFBs are imperative to expand their application fields, engage more users, and cater to the trend of future wireless communication. To this end, a new …
Role Of Authentication Factors In Fin-Tech Mobile Transaction Security, Habib Ullah Khan, Muhammad Sohail, Shah Nazir, Tariq Hussain, Babar Shah, Farman Ali
Role Of Authentication Factors In Fin-Tech Mobile Transaction Security, Habib Ullah Khan, Muhammad Sohail, Shah Nazir, Tariq Hussain, Babar Shah, Farman Ali
All Works
Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. In the massive field of business, mobile money transaction security is a great challenge for researchers. The user authentication schemes restrict the ability to enforce the authentication before the account can access and operate. Although authentication factors provide greater security than a simple static password, financial transactions have potential drawbacks because cybercrime expands the opportunities for fraudsters. The most common enterprise challenge is mobile-based user authentication during transactions, which addresses the security issues …
Lsav: Lightweight Source Address Validation In Sdn To Counteract Ip Spoofing-Based Ddos Attacks, Ali̇ Karakoç, Fati̇h Alagöz
Lsav: Lightweight Source Address Validation In Sdn To Counteract Ip Spoofing-Based Ddos Attacks, Ali̇ Karakoç, Fati̇h Alagöz
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, we propose a design to detect and prevent IP spoofing-based distributed denial of service (DDoS) attacks on software-defined networks (SDNs). DDoS attacks are still one of the significant problems for internet service providers (ISPs) and individual users. These attacks can disrupt customer services by targeting the availability of the system, and in some cases, they can completely shut down the target infrastructure. Protecting the system against DDoS attacks is therefore crucial for ensuring the reliability and availability of internet services. To address this problem, we propose a lightweight source address validation (LSAV) framework that leverages the flexibility …