Articles with "adaptive security" as a keyword



Photo from academic.microsoft.com

Programmable Adaptive Security Scanning for Networked Microgrids

Sign Up to like & get
recommendations!
Published in 2021 at "Engineering"

DOI: 10.1016/j.eng.2021.06.007

Abstract: Abstract Communication-dependent and software-based distributed energy resources (DERs) are extensively integrated into modern microgrids, providing extensive benefits such as increased distributed controllability, scalability, and observability. However, malicious cyber-attackers can exploit various potential vulnerabilities. In this… read more here.

Keywords: scanning networked; security scanning; networked microgrids; programmable adaptive ... See more keywords

Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3094323

Abstract: Existing attribute-based encryption (ABE) schemes with revocation to secure the cloud-assisted Internet of Things (IoTs) raise challenges, such as eliminating the need for predefined public parameters in system initialization, performing the encryption and decryption operations… read more here.

Keywords: adaptive security; encryption; cloud assisted; security ... See more keywords

Ethical Adaptive Security Algorithm for Cross-Platform IoT-Enabled Metaverse Applications

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2025.3547640

Abstract: The prompt expansion of the Metaverse presents challenges for secure and ethical user interactions. Existing security frameworks often lack integration of ethical considerations such as user consent and regulatory compliance. This study develops an Ethical… read more here.

Keywords: security algorithm; metaverse; adaptive security; ethical adaptive ... See more keywords

Classification and Mapping of Adaptive Security for Mobile Computing

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2018.2791459

Abstract: Context: Mobile computing has emerged as a disruptive technology that has empowered its users with portable, connected and context-aware computation. However, issues such as resource poverty, energy efficiency and specifically data security and privacy represents… read more here.

Keywords: security mobile; mobile computing; adaptive security; security ... See more keywords

Adaptive Security Response Strategies Through Conjectural Online Learning

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2025.3558600

Abstract: We study the problem of learning adaptive security response strategies for an IT infrastructure. We formulate the interaction between an attacker and a defender as a partially observed, non-stationary game. We relax the standard assumption… read more here.

Keywords: response; conjectural online; adaptive security; response strategies ... See more keywords