Articles with "adaptive security" as a keyword



Photo from academic.microsoft.com

Programmable Adaptive Security Scanning for Networked Microgrids

Sign Up to like & get
recommendations!
Published in 2021 at "Engineering"

DOI: 10.1016/j.eng.2021.06.007

Abstract: Abstract Communication-dependent and software-based distributed energy resources (DERs) are extensively integrated into modern microgrids, providing extensive benefits such as increased distributed controllability, scalability, and observability. However, malicious cyber-attackers can exploit various potential vulnerabilities. In this… read more here.

Keywords: scanning networked; security scanning; networked microgrids; programmable adaptive ... See more keywords
Photo from wikipedia

Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3094323

Abstract: Existing attribute-based encryption (ABE) schemes with revocation to secure the cloud-assisted Internet of Things (IoTs) raise challenges, such as eliminating the need for predefined public parameters in system initialization, performing the encryption and decryption operations… read more here.

Keywords: adaptive security; encryption; cloud assisted; security ... See more keywords
Photo from wikipedia

Classification and Mapping of Adaptive Security for Mobile Computing

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2018.2791459

Abstract: Context: Mobile computing has emerged as a disruptive technology that has empowered its users with portable, connected and context-aware computation. However, issues such as resource poverty, energy efficiency and specifically data security and privacy represents… read more here.

Keywords: security mobile; mobile computing; adaptive security; security ... See more keywords