Search
Now showing items 1-10 of 12
Access control policy enforcement for zero-trust-networking.
(IEEE, 2018-06)
The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal ...
Dynamic collaboration of centralized & Edge processing for coordinated data management in an IoT paradigm.
(IEEE, 2018-05)
Over the past decade, much focus in the area of Technology has deviated towards two relatively new areas; "The Internet of Things" and "Machine Learning". Although completely separate technologies, they have one major ...
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)
As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT),
enterprises are moving away from traditional perimeter based security models toward so called “zero trust
networking” ...
A governance architecture for self-adaption & control in IoT applications.
(IEEE, 2018-06-25)
The “Internet of Things” has become a reality with
projections of 28 billion connected devices by 2021. Much
R&D is currently focused on creating methods to efficiently
handle an influx of data. Flow based programming, ...
An architecture for intelligent data processing on IoT edge devices.
(IEEE, 2018-05-17)
As the Internet of Things edges closer to
mainstream adoption, with it comes an exponential rise in data
transmission across the current Internet architecture.
Capturing and analyzing this data will lead to a wealth ...
PRISENIT - a probabilistic search recommendation algorithm to improe search efficiency for network intelligence and troubleshooting
(UKSIM, 2015-03)
When searching for data in a telecommunications network management application, large search result sets are common. In order to refine the results to retrieve useful information existing systems normally require additional ...
A flow based architecture for efficient distribution of vehicular information in smart cities.
(IEEE, 2019-12-23)
The Introduction of the Internet of Things has made the
vision of “Smart Cities” a very reachable goal. Aggregating data
from a wealth of sensors throughout a city, with the aim of
improving quality of life for its ...
Bidirectional LSTM autoencoder for sequence based anomaly detection in cyber security.
(United Kingdom Simulation Society, 2019)
Cyber-security is concerned with protecting information, a vital asset in today’s world. The volume of data that is
generated can be usefully analyzed when cyber-security systems are effectively implemented with the aid ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)
Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer International Publishing, 2018)
Cyber security has become one of the most challenging as-
pects of modern world digital technology and it has become imperative
to minimize and possibly avoid the impact of cybercrimes. Host based
intrusion detection ...