Identity and access management for IoT in smart grid
A smart grid (SG) is a complex system that comprises distributed servers and Internet-of-
Things (IoT) devices. IoT devices are resource-constrained and are unable to cope with …
Things (IoT) devices. IoT devices are resource-constrained and are unable to cope with …
Capturing dynamicity and uncertainty in security and trust via situational patterns
Modern smart systems are highly dynamic and allow for dynamic and ad-hoc collaboration
not only among devices, but also among humans and organizations. Such a collaboration …
not only among devices, but also among humans and organizations. Such a collaboration …
A long-lasting reinforcement learning intrusion detection model
Several works have proposed highly accurate network-based intrusion detection schemes
through machine learning techniques. However, they are unable to address changes in …
through machine learning techniques. However, they are unable to address changes in …
Facing the unknown: A stream learning intrusion detection system for reliable model updates
Current machine learning approaches for network-based intrusion detection do not cope
with new network traffic behavior, which requires periodic computationally and time …
with new network traffic behavior, which requires periodic computationally and time …
Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities
Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its
application is highly challenging in multi-domain collaborative smart city environments. The …
application is highly challenging in multi-domain collaborative smart city environments. The …
Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based Encryption
The management and control of heterogeneous IoT devices in cyber-physical systems
(CPS) involves ensuring authorized access to cloud-stored data, including instructions …
(CPS) involves ensuring authorized access to cloud-stored data, including instructions …
A Dynamic Network-based Intrusion Detection Model for Industrial Control Systems
PR de Oliveira, AO Santin… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Industrial Control Systems (ICS) play a crucial role in managing and controlling industrial
assets. Due to their critical importance, adversaries are often highly motivated to target these …
assets. Due to their critical importance, adversaries are often highly motivated to target these …
A Review of Social Network Regulations and Mechanisms for Safeguarding Children's Privacy
The privacy challenges of social networks and their use by children online require the
assessment of legal frameworks and the implemented service provider mechanisms to …
assessment of legal frameworks and the implemented service provider mechanisms to …
Aspect-oriented adaptation of access control rules
Cyber-physical systems (CPS) and IoT systems are nowadays commonly designed as self-
adaptive, endowing them with the ability to dynamically reconFigure to reflect their changing …
adaptive, endowing them with the ability to dynamically reconFigure to reflect their changing …
[PDF][PDF] ATM & Biometric Solutions: A Case Study
Y Sheikh, MI Majid - … Journal of Experiential Learning & Case …, 2019 - researchgate.net
The paper highlights security features for biometric systems along with application-specific
to a bank in Pakistan. Further, a comprehensive view of retinal scanning and application …
to a bank in Pakistan. Further, a comprehensive view of retinal scanning and application …