4.5 Article

A network security algorithm using SVC and sliding window

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A hybrid adaptive block based compressive sensing in video for IoMT applications

B. Lalithambigai et al.

Summary: This paper introduces an efficient hybrid ABBCS (HABBCS) technique, which achieves image/video compression by adaptively estimating the sampling rate. The performance of HABBCS is comparable to ABBCS.

WIRELESS NETWORKS (2022)

Review Computer Science, Information Systems

Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions

Zitian Liao et al.

Summary: Software components play a crucial role in the functionality of software systems and using verified components can save resources. Researchers need to pay special attention to security evaluation of software components.

SECURITY AND COMMUNICATION NETWORKS (2021)

Review Computer Science, Software Engineering

Security and provenance for Internet of Health Things: A systematic literature review

Baogang Bai et al.

Summary: Internet of Health Things (IoHT) is crucial in healthcare processes, with security being a key factor. Literature on IoHT security covers various aspects, but there is a need for a more systematic review. This study provides a systematic literature review to help researchers devise novel solutions.

JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS (2021)

Article Automation & Control Systems

Lightweight Mutual Authentication and Privacy-Preservation Scheme for Intelligent Wearable Devices in Industrial-CPS

Mian Ahmad Jan et al.

Summary: Industry 5.0 encompasses the digitalization, automation, and data exchange in industrial processes involving AI, IIoT, and I-CPS. In healthcare, I-CPS enables intelligent wearable devices to gather and transmit data supporting decision-making with innovative applications. However, challenges such as privacy risks for wearable devices in I-CPS highlight the need for lightweight mutual authentication schemes to address security concerns.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods

Lanjing Wang et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review

Bin Liao et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Scalable video encryption of H.264 SVC Codec

Gul Boztok Algin et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2011)

Article Engineering, Electrical & Electronic

Overview of the Scalable Video Coding extension of the H.264/AVC standard

Heiko Schwarz et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2007)