Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Federated distillation and blockchain empowered secure knowledge sharing for internet of medical things

X Zhou, W Huang, W Liang, Z Yan, J Ma, Y Pan… - Information …, 2024 - Elsevier
With the development of Internet of Things (IoT) and Artificial Intelligence (AI) technologies,
smart services have penetrated into every aspect of our daily lives, including the medical …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

Twenty security considerations for cloud-supported Internet of Things

J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
To realize the broad vision of pervasive computing, underpinned by the “Internet of
Things”(IoT), it is essential to break down application and technology-based silos and …

InFeMo: Flexible big data management through a federated cloud system

CL Stergiou, KE Psannis, BB Gupta - ACM Transactions on Internet …, 2021 - dl.acm.org
This paper introduces and describes a novel architecture scenario based on Cloud
Computing and counts on the innovative model of Federated Learning. The proposed model …

[HTML][HTML] A model to develop chatbots for assisting the teaching and learning process

S Mendoza, LM Sánchez-Adame, JF Urquiza-Yllescas… - Sensors, 2022 - mdpi.com
Recently, in the commercial and entertainment sectors, we have seen increasing interest in
incorporating chatbots into websites and apps, in order to assist customers and clients. In …

Practical whole-system provenance capture

T Pasquier, X Han, M Goldstein, T Moyer… - Proceedings of the …, 2017 - dl.acm.org
Data provenance describes how data came to be in its present form. It includes data sources
and the transformations that have been applied to them. Data provenance has many uses …

Towards scalable cluster auditing through grammatical inference over provenance graphs

WU Hassan, L Aguse, N Aguse, A Bates… - Network and Distributed …, 2018 - par.nsf.gov
Investigating the nature of system intrusions in large distributed systems remains a
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …

R-caid: Embedding root cause analysis within provenance-based intrusion detection

A Goyal, G Wang, A Bates - 2024 IEEE Symposium on Security …, 2024 - ieeexplore.ieee.org
In modern enterprise security, endpoint detection products fire an alert when process activity
matches known attack behavior patterns. Human analysts then perform Root Cause …