Sign Up to like & get
recommendations!
0
Published in 2021 at "Engineering"
DOI: 10.1016/j.eng.2021.06.007
Abstract: Abstract Communication-dependent and software-based distributed energy resources (DERs) are extensively integrated into modern microgrids, providing extensive benefits such as increased distributed controllability, scalability, and observability. However, malicious cyber-attackers can exploit various potential vulnerabilities. In this…
read more here.
Keywords:
scanning networked;
security scanning;
networked microgrids;
programmable adaptive ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3094323
Abstract: Existing attribute-based encryption (ABE) schemes with revocation to secure the cloud-assisted Internet of Things (IoTs) raise challenges, such as eliminating the need for predefined public parameters in system initialization, performing the encryption and decryption operations…
read more here.
Keywords:
adaptive security;
encryption;
cloud assisted;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Consumer Electronics"
DOI: 10.1109/tce.2025.3547640
Abstract: The prompt expansion of the Metaverse presents challenges for secure and ethical user interactions. Existing security frameworks often lack integration of ethical considerations such as user consent and regulatory compliance. This study develops an Ethical…
read more here.
Keywords:
security algorithm;
metaverse;
adaptive security;
ethical adaptive ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Emerging Topics in Computing"
DOI: 10.1109/tetc.2018.2791459
Abstract: Context: Mobile computing has emerged as a disruptive technology that has empowered its users with portable, connected and context-aware computation. However, issues such as resource poverty, energy efficiency and specifically data security and privacy represents…
read more here.
Keywords:
security mobile;
mobile computing;
adaptive security;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2025.3558600
Abstract: We study the problem of learning adaptive security response strategies for an IT infrastructure. We formulate the interaction between an attacker and a defender as a partially observed, non-stationary game. We relax the standard assumption…
read more here.
Keywords:
response;
conjectural online;
adaptive security;
response strategies ... See more keywords