January 2017
·
761 Reads
·
23 Citations
SSRN Electronic Journal
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
January 2017
·
761 Reads
·
23 Citations
SSRN Electronic Journal
January 2017
·
25 Reads
·
16 Citations
SSRN Electronic Journal
January 2017
·
637 Reads
·
1 Citation
March 2016
·
173 Reads
·
8 Citations
SSRN Electronic Journal
January 2016
·
2 Reads
·
4 Citations
SSRN Electronic Journal
January 2016
·
1,807 Reads
·
1 Citation
January 2016
·
5 Reads
·
12 Citations
SSRN Electronic Journal
January 2016
·
2 Reads
·
10 Citations
SSRN Electronic Journal
December 2015
·
111 Reads
·
21 Citations
SSRN Electronic Journal
November 2015
·
424 Reads
·
16 Citations
SSRN Electronic Journal
... With their high success rate, zero-day attacks typically target high-value targets such as critical infrastructure and financial and medical institutions [9]. Therefore, attackers keep newly discovered vulnerabilities confidential for as long as possible, maximizing the possibility of an attack succeeding [10]. Hence, reliably defending against such attacks requires exploring alternative solutions due to their nature, which has not been seen before [11]. ...
January 2016
SSRN Electronic Journal
... CC: the security persists in CC deployment, cloud vulnerabilities are time by time published and patches are updated according to the security concern (Lamba et al., 2016), all patching is deployed by CSP, and everyone belongs to IT organisations having security concerns. Through customer data, details like bank usage user login ID/password credentials are hacked that why security threats are existent. ...
January 2016
SSRN Electronic Journal
... In the past, such attacks have occurred in the real world; hence, we can say they were real-world attacks (RWA). Examples include Iran's uranium Stuxnet attack in 2010 that caused a sufficient setback to Iran's nuclear program and damaged their centrifuge [8]; the German steel mill attack in 2014 that caused significant loss (the mill avoided blast burning from shutting down) [9]; the power company attack in Ukraine in 2015 that detached small-level stations from the power grid, leaving millions of customers without power for a long time [10]; the similar attack in Ukraine in 2016 on transmission-level substations that disconnected capital without power for more than an hour [11]; and the attacks on the petrochemical plant in Saudi Arabia in 2017 that shut down the safety controller of the plant which could have caused massive loss, damage, or an explosion [12]. Industry, the malware behind the power grid attack in Ukraine in 2016 and the Saudi petrochemical attack in 2017 are still active in targeting energy sectors and electrical power substations [13,14]. ...
January 2017
SSRN Electronic Journal
... Tree Protocol (STP) to transmit STP signals incessantly. to as SU (Server Unit) [22][23][24][25][26]. Every module interacts with the other modules through a set certificate as well as hierarchical rules. ...
January 2016
SSRN Electronic Journal
... Attackers exploit software vulnerabilities in IoT-enabled medical devices, embedding spyware into legitimate applications to capture patient records, login credentials, and financial details [11]. Additionally, supply chain attacks introduce spyware through third-party vendors, bypassing traditional security defenses [12]. ...
January 2018
SSRN Electronic Journal
... Moreover, the launch of general-purpose quantum machines is also expected within this decade to solve the complicated number theory problems, such as discrete logarithmic and factorization, in a specific time, which is a resilient potential threat to block cipher applications (Lindsay 2020;Lamba et al. 2018;Mashatan and Turetken 2020;Kumari and Gupta 2021). It has also been revealed that the low-dimensional chaos-based encryption algorithms (Pérez and Cerdeira 1995;Parker and Short 2001) will suffer the potential loss of confidentiality because of predictable trajectories and small keyspace (Kocarev 2001;Wang et al. 2011;Li et al. 2018). ...
April 2018
... Therefore, conventional information gathering, management, and analysis methods might not operate on this scale [195,196]. Also, the complexity of the data produced by IoT provides a different front for the existing data processing mechanisms [197][198][199][200]. Personal security and data protection are two of the main considerations in the company implementation of IoT facilities and implementations [102,198]. ...
January 2017
... Copula is a function that can combine several single variable marginal distribution functions that are uniform in one dimension into one multivariable distribution function [16]. According to [17,18], copulas can better describe the dependencies between random variables. ...
July 2017
... Instead, IoT can easily take advantage of the decentralized capabilities offered by blockchain networks. From this point onward, future developments of the Internet of Things do not have to rely on centralized services for trust [42][43][44]. The Internet of Things (IoT) and Blockchain integration frameworks have both been the subject of in-depth research in recent scholarly works. ...
April 2017
SSRN Electronic Journal
... and/or GPRS. 9. Dual SIM capability, the 2nd SIM will be used as backup in case there is no connectivity using the 1st SIM. 10. ...
November 2014
SSRN Electronic Journal