Article
Computer Science, Theory & Methods
Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
Summary: In recent years, stealing attacks against controlled information using machine learning algorithms have emerged as a significant cyber security threat, making detection and defense challenging and urgent. This survey reviews the recent advances in this type of attack, categorizes them into three types based on the targeted controlled information, and proposes countermeasures focusing on detection, disruption, and isolation for effective protection.
ACM COMPUTING SURVEYS
(2021)
Review
Computer Science, Information Systems
Omer Aslan, Semih Serkant Aktug, Merve Ozkan-Okay, Abdullah Asim Yilmaz, Erdal Akin
Summary: Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The pandemic has accelerated this process. As a result, traditional crimes have shifted to the digital space.
Review
Energy & Fuels
Yuchong Li, Qinghui Liu
Summary: Most economic, commercial, cultural, social, and governmental activities worldwide take place in cyberspace, with organizations facing challenges from cyber-attacks and wireless communication technology dangers. Various solutions are used to protect data, and researchers propose methods to prevent or minimize damage from cyber-attacks.
Article
Computer Science, Artificial Intelligence
Xing Gao, Siyu Gong, Ying Wang, Xifan Wang, Manting Qiu
Summary: This paper examines the strategic interaction between firms and hackers in a resource sharing environment and finds that stricter security standards should be formulated from a socially optimal standpoint. It also suggests that compensation mechanisms may harm each firm.
EXPERT SYSTEMS WITH APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Hong Lin, James Lam, Zheng Wang
Summary: The study focuses on state estimation for cyber-physical systems under mixed denial-of-service (DoS) and false data injection (FDI) attacks. An optimal estimator with exponentially growing components is obtained, but an approximate estimator using the generalized pseudo-Bayesian algorithm is proposed for efficient computation. Both the optimal estimator and the proposed approximate estimator are proven to be secure for stable systems, with boundedness theoretically characterized between the two estimates.
INFORMATION SCIENCES
(2021)
Article
Chemistry, Analytical
Mashor Housh, Noy Kadosh, Jack Haddad
Summary: This study proposes a novel approach for detecting and localizing cyber-attacks in water distribution systems. The approach utilizes attack-free datasets for semi-supervised learning, eliminating the need for a predetermined list of labeled attacks. Experimental results demonstrate consistently high performance in detecting and localizing cyber-attacks.
Article
Engineering, Civil
Yuanzhe Wang, Qipeng Liu, Ehsan Mihankhah, Chen Lv, Danwei Wang
Summary: This paper explores the cybersecurity challenges faced by autonomous vehicles when under sensor attacks. A model-based framework is proposed to detect attacks and identify their sources for secure localization. Sensor redundancy and a bank of attack detectors are utilized to ensure robustness against cyber-attacks.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2022)
Article
Information Science & Library Science
Shandre Jansen van Rensburg
Summary: Information is a crucial asset for organizations, but can easily be compromised, making its protection essential. Social engineering, a common information security breach, manipulates human nature to access sensitive information for illicit purposes. This research emphasizes the role of employees in defending against social engineering attacks and advocates for a multi-disciplinary protection model to enhance organizations' information security culture.
JOURNAL OF GLOBAL INFORMATION MANAGEMENT
(2021)
Article
Education, Scientific Disciplines
Jessica L. Kamerer, Donna S. Mcdermott
Summary: The healthcare industry is at risk of cybercrime, which can lead to financial loss and breach of privacy. Nurses, as frontline healthcare workers, should receive education about the risks and their role in preventing cyber-attacks.
NURSE EDUCATION TODAY
(2023)
Article
Mathematics
Chunhui Zhao, Shuaijie Si, Tengfei Tu, Yijie Shi, Sujuan Qin
Summary: This paper explores the application of deep learning technology in network security in the new era and optimizes the detection method and model of web injection attacks, improving detection efficiency and accuracy.
Article
Computer Science, Interdisciplinary Applications
Jacob Willem Abraham Witsenboer, Klaas Sijtsma, Fedde Scheele
Summary: This study explores the development of cyber secure behavior among Dutch students during their school career. The findings reveal a lack of attention to cyber security in the Dutch school curriculum, with students relying mainly on experience, internet instructions, parents, and siblings to shape their online behavior. Additionally, many students exhibit increasingly reckless behavior over time.
COMPUTERS & EDUCATION
(2022)
Article
Automation & Control Systems
Peijun Wang, Guanghui Wen, Xinghuo Yu, Wenwu Yu, Ying Wan
Summary: This study focuses on synchronization control in complex networks subject to cyber and physical attacks, providing theoretical criteria and algorithmic approaches to ensure synchronization achievement and network security.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2021)
Article
Computer Science, Interdisciplinary Applications
Kai Yang, Haining Wang, Limin Sun
Summary: This paper presents the first resilience approach for protecting PLCs against data tampering attacks by embedding security mechanisms into their control logic. The approach includes data authentication and data recovery mechanisms, which can be implemented on the programmable logic circuit of PLCs through code updating.
COMPUTERS IN INDUSTRY
(2022)
Article
Engineering, Multidisciplinary
Sree Subiksha M. Reshikeshan, Myung Bae Koh, Mahesh S. Illindala
Summary: This research proposes the application of the rainbow signature scheme (RSS) to secure GOOSE messages, addressing the shortcomings of the recommended authentication schemes by IEC 62351-6. By utilizing RSS, fast signature generation and verification can be achieved while meeting the time-latency and security requirements of the GOOSE protocol.
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Tohari Ahmad, Alek Nur Fatman
Summary: The rapid development of information technology has made security a crucial factor. This study addresses the challenges of quality and capacity in hiding data within video files by exploring histograms and prediction errors. Experimental results show that this method outperforms other algorithms in terms of peak signal to noise ratio (PSNR) and can hold more bits without sacrificing stego quality. Additionally, this approach is reversible, allowing for extraction of both cover and secret from the stego file.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Artificial Intelligence
Nadia Mumtaz, Naveed Ejaz, Shabana Habib, Syed Muhammad Mohsin, Prayag Tiwari, Shahab S. Band, Neeraj Kumar
Summary: This paper discusses the generation of big video data in smart cities and focuses on violence detection using deep learning approaches. The paper provides an overview of deep sequence learning methods and localization strategies for violence detection. It also explores the initial image processing and machine learning-based violence detection literature and their advantages and disadvantages. Additionally, the paper discusses datasets and proposes future directions in the violence detection domain based on in-depth analysis of previous methods.
ARTIFICIAL INTELLIGENCE REVIEW
(2023)
Review
Computer Science, Information Systems
Deepanshi, Ishan Budhiraja, Deepak Garg, Neeraj Kumar, Rohit Sharma
Summary: SARS-CoV-2 is an infected disease caused by one of the variants of Coronavirus which emerged in December 2019. It is declared a pandemic by WHO in March 2020. COVID-19 outbreak has put the world on a halt and is a major threat to the public health system. Despite of numerous efforts, precautions and vaccination the infection has grown rapidly in the world.
COMPUTER COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Ashwin Verma, Pronaya Bhattacharya, Deepti Saraswat, Sudeep Tanwar, Neeraj Kumar, Ravi Sharma
Summary: Recently, UAVs have been used for COVID-19 vaccine distribution to address fake vaccine issues. The authors propose a blockchain-assisted UAV vaccine distribution scheme based on sixth-generation enhanced ultra-reliable low latency communication (6G-eRLLC). The scheme utilizes a public Solana blockchain setup for user registration, vaccine request, and distribution, ensuring scalable transactions. With an intelligent edge offloading scheme, UAV swarms are deployed to deliver vaccines to nodal centers, showing significant improvements in service latency, energy reduction, UAV coverage, and storage cost compared to 5G uRLLC communication and Ethereum network.
IEEE SENSORS JOURNAL
(2023)
Article
Computer Science, Hardware & Architecture
Dan Tang, Xiyin Wang, Xiong Li, Pandi Vijayakumar, Neeraj Kumar
Summary: Low-rate denial of service (LDoS) attacks exploit network protocol vulnerabilities to launch periodic bursts, severely impacting TCP application quality of service. Current coarse-scale detection methods are ineffective. To accurately detect LDoS attacks, an adaptive Kohonen Network based fine-grained detection (AKN-FGD) model is proposed. The AKN-FGD scheme achieves accurate detection with high detection performance and adaptability, outperforming other methods.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Computer Science, Information Systems
Dharminder Dharminder, Challa Bhageeratha Reddy, Ashok Kumar Das, Youngho Park, Sajjad Shaukat Jamal
Summary: This article presents an efficient lattice-based authenticated key exchange protocol for IoT-enabled smart devices. The protocol utilizes the reconciliation mechanism and is shown to be robust against various attacks through detailed security analysis. Simulation results in the NS-3 simulator demonstrate superior security, lower computational cost, and comparable communication cost compared to competing schemes.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Ashok Kumar Das, Sandip Roy, Eranga Bandara, Sachin Shetty
Summary: Low-power wireless sensor networks (WSNs) and Internet of Things (IoT) have a significant impact on the real-time applications in future 5th generation (5G) mobile networks. To address security concerns, a security scheme is designed for AoI-enabled 5G smart warehouse, using access control mechanism, mutual device authentication, and key agreement process for secure communication. The proposed mechanism demonstrates better security and comparable communication and computational costs, as shown through rigorous security analysis, comparative study, and real-time testbed experiments.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, Ashok Kumar Das, Sajjad Shaukat Jamal
Summary: This article introduces a user authentication scheme for mitigating phishing attacks in online social networks, called ASPA-mOSN. Through security analysis and comparison with other schemes, this scheme performs well in terms of security and performance.
IEEE SYSTEMS JOURNAL
(2023)
Article
Computer Science, Hardware & Architecture
KiSung Park, JoonYoung Lee, Ashok Kumar Das, Youngho Park
Summary: With the revolutionary growth of the industrial Internet of Things and smart grid networks, smart grid (SG) communication has become the next-generation network for intelligent and efficient electric power transmission. However, SG networks face security issues with smart meters (SMs) and untrusted wireless communication. To address these issues, we propose a privacy-preserving authentication scheme for demand response management in SGs, called BPPS. It provides secure mutual authentication, integrity of demand-response data using blockchain, and has been analyzed for security and performance in simulations.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Automation & Control Systems
Yajie Wang, Yu-an Tan, Thar Baker, Neeraj Kumar, Quanxin Zhang
Summary: Industry 5.0 aims to merge the cognitive computing capabilities of DNNs with human resourcefulness in collaborative operations. However, DNNs are vulnerable to adversarial attacks, bringing risks to Industrial AIoT systems. To solve these problems, we propose two novel deep fusion methods.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Rajat Chaudhary, Neeraj Kumar
Summary: Software-Defined Internet of Vehicles (SD-IoV) is an emerging technology used in modern intelligent transportation systems. The goal of SD-IoV is to provide seamless connectivity with low latency and high-speed data transfer. However, the challenges of high power consumption and secure data transfer arise due to the increased density of connected vehicles using the Internet. In this paper, a joint power optimization and secrecy ensured scheme known as SecGreen is proposed to address these issues.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Computer Science, Information Systems
Ashish Singh, Kakali Chatterjee, Anish Kumar Singh, Neeraj Kumar
Summary: Mobile-edge computing (MEC) is a new architecture providing services at the network edge, with potential applications in healthcare for remote patient monitoring, diagnosis, and treatment. However, there are security and privacy concerns related to remote data access, including unauthorized access and data leakage, which can make the system inconvenient, untrusted, less suitable, and vulnerable.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Peiying Zhang, Yi Zhang, Neeraj Kumar, Ching-Hsien Hsu
Summary: Due to geographical factors and resource constraints, the traditional Internet architecture cannot meet the needs of the space-air-ground-integrated network (SAGIN) resource layout in the Industrial Internet of Things (IIoT) service. This article proposes a latency-sensitive VNE algorithm based on deep reinforcement learning (DDRL-VNE) in the SAGIN environment to efficiently arrange network resources and meet the quality of service requirements of users. Experimental results effectively illustrate the effectiveness of the algorithm in the SAGIN resource allocation problem.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Engineering, Civil
Muhammad Ayzed Mirza, Junsheng Yu, Salman Raza, Manzoor Ahmed, Muhammad Asif, Azeem Irshad, Neeraj Kumar
Summary: This paper proposes a mobility, contact, and computational load-aware (MCLA) task offloading scheme for heterogeneous vehicular edge computing networks, which integrates different wireless technologies to improve network performance and meet low-latency and cost constraints. The scheme leverages the computational power of public vehicles and shareable computations from passengers' mobile equipment to enhance computation capacity. Extensive evaluations show that the MCLA scheme significantly improves task turnover ratio by 4%-15% with lower transmission and computation costs of 4.7%-29.8%.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Civil
Mohammad Wazid, Ashok Kumar Das, Sachin Shetty
Summary: Internet of Space Things (IoST), also known as CubeSats, expands the uses and functionalities of traditional Internet of Things (IoT) by providing satellite networks and real-time satellite data. To address data security in IoST, an authentication and key management framework called SAKM-IoST has been proposed, which demonstrates resilience against potential threats and attacks.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Telecommunications
Neha Garg, Rajat Petwal, Mohammad Wazid, D. P. Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues
Summary: The Internet of Medical Things (IoMT) is a collection of smart healthcare devices that are connected via the Internet to improve overall healthcare outcomes. However, IoMT is vulnerable to security and privacy attacks, so a robust security mechanism is necessary to prevent such attacks.
DIGITAL COMMUNICATIONS AND NETWORKS
(2023)
Editorial Material
Computer Science, Theory & Methods
Kiho Lim, Christian Esposito, Tian Wang, Chang Choi
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Editorial Material
Computer Science, Theory & Methods
Jesus Carretero, Dagmar Krefting
Summary: Computational methods play a crucial role in bioinformatics and biomedicine, especially in managing large-scale data and simulating complex models. This special issue focuses on security and performance aspects in infrastructure, optimization for popular applications, and the integration of machine learning and data processing platforms to improve the efficiency and accuracy of bioinformatics.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Renhao Lu, Weizhe Zhang, Qiong Li, Hui He, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Zenglin Xu, Mamoun Alazab
Summary: Federated Learning allows collaborative training of AI models with local data, and our proposed FedAAM scheme improves convergence speed and training efficiency through an adaptive weight allocation strategy and asynchronous global update rules.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Qiangqiang Jiang, Xu Xin, Libo Yao, Bo Chen
Summary: This paper proposes a multi-objective energy-efficient task scheduling technique (METSM) for edge heterogeneous multiprocessor systems. A mathematical model is established for the task scheduling problem, and a problem-specific algorithm (IMO) is designed for optimizing task scheduling and resource allocation. Experimental results show that the proposed algorithm can achieve optimal Pareto fronts and significantly save time and power consumption.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Editorial Material
Computer Science, Theory & Methods
Weimin Li, Lu Liu, Kevin I. K. Wang, Qun Jin
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Mohammed Riyadh Abdmeziem, Amina Ahmed Nacer, Nawfel Moundji Deroues
Summary: Internet of Things (IoT) devices have become ubiquitous and brought the need for group communications. However, security in group communications is challenging due to the asynchronous nature of IoT devices. This paper introduces an innovative approach using blockchain technology and smart contracts to ensure secure and scalable group communications.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Robert Sajina, Nikola Tankovic, Ivo Ipsic
Summary: This paper presents and evaluates a novel approach that utilizes an encoder-only transformer model to enable collaboration between agents learning two distinct NLP tasks. The evaluation results demonstrate that collaboration among agents, even when working towards separate objectives, can result in mutual benefits.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Hebert Cabane, Kleinner Farias
Summary: Event-driven architecture has been widely adopted in the software industry for its benefits in software modularity and performance. However, there is a lack of empirical evidence to support its impact on performance. This study compares the performance of an event-driven application with a monolithic application and finds that the monolithic architecture consumes fewer computational resources and has better response times.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Haroon Wahab, Irfan Mehmood, Hassan Ugail, Javier Del Ser, Khan Muhammad
Summary: Wireless capsule endoscopy (WCE) is a revolutionary diagnostic method for small bowel pathology. However, the manual analysis of WCE videos is cumbersome and the privacy concerns of WCE data hinder the adoption of AI-based diagnoses. This study proposes a federated learning framework for collaborative learning from multiple data centers, demonstrating improved anomaly classification performance while preserving data privacy.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Maruf Monem, Md Tamjid Hossain, Md. Golam Rabiul Alam, Md. Shirajum Munir, Md. Mahbubur Rahman, Salman A. AlQahtani, Samah Almutlaq, Mohammad Mehedi Hassan
Summary: Bitcoin, the largest cryptocurrency, faces challenges in broader adaption due to long verification times and high transaction fees. To tackle these issues, researchers propose a learning framework that uses machine learning to predict the ideal block size in each block generation cycle. This model significantly improves the block size, transaction fees, and transaction approval rate of Bitcoin, addressing the long wait time and broader adaption problem.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Rafael Duque, Crescencio Bravo, Santos Bringas, Daniel Postigo
Summary: This paper introduces the importance of user interfaces for digital twins and presents a technique called ADD for modeling requirements of Human-DT interaction. A study is conducted to assess the feasibility and utility of ADD in designing user interfaces, using the virtualization of a natural space as a case study.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Xiulin Li, Li Pan, Wei Song, Shijun Liu, Xiangxu Meng
Summary: This article proposes a novel multiclass multi-pool analytical model for optimizing the quality of composite service applications deployed in the cloud. By considering embarrassingly parallel services and using differentiated parallel processing mechanisms, the model provides accurate prediction results and significantly reduces job response time.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Seongwan Park, Woojin Jeong, Yunyoung Lee, Bumho Son, Huisu Jang, Jaewook Lee
Summary: In this paper, a novel MEV detection model called ArbiNet is proposed, which offers a low-cost and accurate solution for MEV detection without requiring knowledge of smart contract code or ABIs.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Sacheendra Talluri, Nikolas Herbst, Cristina Abad, Tiziano De Matteis, Alexandru Iosup
Summary: Serverless computing is increasingly used in data-processing applications. This paper presents ExDe, a framework for systematically exploring the design space of scheduling architectures and mechanisms, to help system designers tackle complexity.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu
Summary: This paper introduces a Federated Learning framework called FedBnR to address the issue of potential data heterogeneity in distributed entities. By breaking up the original task into multiple subtasks and reconstructing the representation using feature extractors, the framework improves the learning performance on heterogeneous datasets.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)