Browsing Computer Science by Subject "Security"
Now showing items 1-8 of 8
-
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ... -
BCPriPIoT: BlockChain utilized privacy-preservation mechanism for IoT devices
(IEEE, 2021)Security and privacy are the primary concerns for IoT devices but because of their inherent limitation both in terms of processing and energy, IoT devices cannot be deployed at their full scale. To alleviate such security ... -
Combined AES + AEGIS architectures for high performance and lightweight security applications
(Springer International Publishing, 2014)AES has been the prominent block cipher since its introduction as the standard. It has been the cipher used in almost all new applications that require solid, unbreakable security with reasonable resource usage. Several ... -
Detection of malicious social bots: A survey and a refined taxonomy
(Elsevier, 2020-08-01)Social hots represent a new generation of hots that make use of online social networks (OSNs) as command and control (C&C) channels. Malicious social hots have been used as tools for launching large-scale spam campaigns, ... -
Effort estimation for architectural refactoring to introduce module isolation
(Springer, 2014)The decomposition of software architecture into modular units is driven by both functional and quality concerns. Dependability and security are among quality concerns that require a software to be decomposed into separate ... -
EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things
(Elsevier, 2024-01)With the increasing popularity of the Internet of things (IoT) and giving the end users the opportunity of collecting and analyzing the data by these IoT devices give rise to ultimate privacy concern and is attracting ... -
Fully autonomous trustworthy unmanned aerial vehicle teamwork: A research guideline using level 2 blockchain
(IEEE, 2023-02)The vast range of possible fully autonomous multiunmanned aerial vehicle (multi-UAV) operations is creating a new and expanding market where technological advances are happening at a breakneck pace. The integration of UAVs ... -
Minimizing false positive rate for DoS attack detection: A hybrid SDN-based approach
(Elsevier, 2020-06)Denial of Service attacks (DoS) are considered to be a major threat against today's communication networks. Recently, a novel networking paradigm that provides enhanced programming abilities has been proposed to attain an ...
Share this page