Articles with "security analysis" as a keyword



Photo from archive.org

Security analysis of a proposed internet of things middleware

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0729-3

Abstract: This paper proposes security measures for a defined uniform and transparent internet of things middleware, named UIoT. The proposed architecture is deployable and comprises protection measures based on existent technologies for internet security, as well… read more here.

Keywords: security analysis; things middleware; security; internet things ... See more keywords
Photo from archive.org

Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6598-9

Abstract: In recent years, reversible data hiding in encrypted images (RDH-EI) has attracted more and more attention, and many RDH-EI algorithms have been proposed. Scholars focus on improving embedded capacity and decreasing bit error rate, but… read more here.

Keywords: algorithm; encrypted images; security analysis; reversible watermarking ... See more keywords
Photo by homajob from unsplash

Asymptotic security analysis of teleportation-based quantum cryptography

Sign Up to like & get
recommendations!
Published in 2020 at "Quantum Information Processing"

DOI: 10.1007/s11128-020-02701-w

Abstract: We prove that the teleportation-based quantum cryptography protocol presented in Gordon and Rigolin (Opt Commun 283:184, 2010), which is built using only orthogonal states encoding the classical bits that are teleported from Alice to Bob,… read more here.

Keywords: based quantum; security analysis; security; quantum cryptography ... See more keywords
Photo from wikipedia

An integrated safety and security analysis for cyber-physical harm scenarios

Sign Up to like & get
recommendations!
Published in 2021 at "Safety Science"

DOI: 10.1016/j.ssci.2021.105458

Abstract: Abstract Increasing digitalization and autonomous solutions in physical systems promise to enhance their performance, cost-efficiency and reliability. However, the integration of novel information technologies with safety-related systems also brings new vulnerabilities and risks that challenge… read more here.

Keywords: security analysis; harm scenarios; analysis; safety ... See more keywords
Photo by sarahdorweiler from unsplash

Security analysis of cyber-physical systems using H 2 norm

Sign Up to like & get
recommendations!
Published in 2017 at "Iet Control Theory and Applications"

DOI: 10.1049/iet-cta.2016.1391

Abstract: In this study, the effect of attacks on networked systems is studied and a new security index to analyse the impact of such attacks using H 2 norms of attacks to target and monitoring outputs… read more here.

Keywords: security analysis; analysis; cyber physical; security ... See more keywords
Photo by dawson2406 from unsplash

Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2926401

Abstract: Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et… read more here.

Keywords: pollution attacks; security analysis; homomorphic mac; security ... See more keywords
Photo from wikipedia

Graph-based Cyber Security Analysis of State Estimation in Smart Power Grid

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.2017.1600210c

Abstract: The smart power grid enables intelligent automation at all levels of power system operation, from electricity generation at power plants to power usage in the home. The key enabling factor of an efficient smart grid… read more here.

Keywords: grid; state estimation; security analysis; power ... See more keywords
Photo by traxer from unsplash

Security Analysis of Cryptocurrency Wallets in Android-Based Applications

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Network"

DOI: 10.1109/mnet.011.2000025

Abstract: As digital currency wallets are gaining popularity, security incidents related to them are also increasing. They lead to the disclosure of users' private information and security threats of users' assets. This article analyzes the security… read more here.

Keywords: wallets android; analysis cryptocurrency; security analysis; security ... See more keywords
Photo from wikipedia

Security Analysis of Linearization for Nonlinear Networked Control Systems Under DoS

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Control of Network Systems"

DOI: 10.1109/tcns.2021.3078130

Abstract: We explore a security analysis of nonlinear networked control systems under denial-of-service (DoS) attacks. In particular, we focus on the vulnerability of a linearization approach in a stabilization problem. When linearization-based control is used, DoS… read more here.

Keywords: linearization; control; security analysis; networked control ... See more keywords
Photo by dawson2406 from unsplash

Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2018.2812080

Abstract: Over the past years, an enormous variety of different chaos-based image and video encryption algorithms have been proposed and published. While any algorithm published undergoes some more or less strict experimental security analysis, many of… read more here.

Keywords: based image; security analysis; security; encryption ... See more keywords
Photo by dawson2406 from unsplash

Security Analysis of Scan Obfuscation Techniques

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3265815

Abstract: Scan is the de-facto standard for testing, which provides high observability and test coverage by enabling direct access to chip memory elements. The scan-based Design-for-Testability (DfT) technique has also become the prime target of attackers… read more here.

Keywords: obfuscation; scan obfuscation; security analysis; obfuscation techniques ... See more keywords