SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Akhunzada Adnan) "

Sökning: WFRF:(Akhunzada Adnan)

  • Resultat 1-5 av 5
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Abdelaziz, Ahmed, et al. (författare)
  • Survey on network virtualization using openflow : Taxonomy, opportunities, and open issues
  • 2016
  • Ingår i: KSII Transactions on Internet and Information Systems. - : Korean Society for Internet Information (KSII). - 1976-7277. ; 10:10, s. 4902-4932
  • Tidskriftsartikel (refereegranskat)abstract
    • The popularity of network virtualization has recently regained considerable momentum because of the emergence of OpenFlow technology. It is essentially decouples a data plane from a control plane and promotes hardware programmability. Subsequently, OpenFlow facilitates the implementation of network virtualization. This study aims to provide an overview of different approaches to create a virtual network using OpenFlow technology. The paper also presents the OpenFlow components to compare conventional network architecture with OpenFlow network architecture, particularly in terms of the virtualization. A thematic OpenFlow network virtualization taxonomy is devised to categorize network virtualization approaches. Several testbeds that support OpenFlow network virtualization are discussed with case studies to show the capabilities of OpenFlow virtualization. Moreover, the advantages of popular OpenFlow controllers that are designed to enhance network virtualization is compared and analyzed. Finally, we present key research challenges that mainly focus on security, scalability, reliability, isolation, and monitoring in the OpenFlow virtual environment. Numerous potential directions to tackle the problems related to OpenFlow network virtualization are likewise discussed
  •  
2.
  • Alam, Quratulain, et al. (författare)
  • Formal Verification of the xDAuth Protocol
  • 2016
  • Ingår i: IEEE Transactions on Information Forensics and Security. - 1556-6013 .- 1556-6021. ; 11:9, s. 1956-1969
  • Tidskriftsartikel (refereegranskat)abstract
    • Service Oriented Architecture (SOA) offers a flexible paradigm for information flow among collaborating organizations. As information moves out of an organization boundary, various security concerns may arise, such as confidentiality, integrity, and authenticity that needs to be addressed. Moreover, verifying the correctness of the communication protocol is also an important factor. This paper focuses on the formal verification of the xDAuth protocol, which is one of the prominent protocols for identity management in cross domain scenarios. We have modeled the information flow of xDAuth protocol using High Level Petri Nets (HLPN) to understand protocol information flow in a distributed environment. We analyze the rules of information flow using Z language while Z3 SMT solver is used for verification of the model. Our formal analysis and verification results reveal the fact that the protocol fulfills its intended purpose and provides the security for the defined protocol specific properties, e.g. secure secret key authentication, Chinese wall security policy and secrecy specific properties, e.g. confidentiality, integrity, authenticity.
  •  
3.
  • Khan, Tanveer, et al. (författare)
  • Towards augmented proactive cyberthreat intelligence
  • 2019
  • Ingår i: Journal of Parallel and Distributed Computing. - : Elsevier BV. - 0743-7315 .- 1096-0848. ; 124, s. 47-59
  • Tidskriftsartikel (refereegranskat)abstract
    • In cyber crimes, attackers are becoming more inventive with their exploits and use more sophisticated techniques to bypass the deployed security system. These attacks are targeted and are commonly referred as Advanced Persistent Threats (APTs). The currently available techniques to tackle these attacks are mostly reactive and signature based. Security Information and Event Management (SIEM), a proactive approach is the best solution. However, the major problem with SIEM is tackling huge amount of data in real time that makes it a time consuming and tedious task for security analyst. The use of threat intelligence caters to such issue by prioritizing the level of threat. In this paper, we assign risk score and confidence value to each feed generated at our product “T-Eye platform”. On the basis of these values, we assign a severity score to each feed type. Severity score assigns a level to the threat means prioritize the threat. The results, we achieved for prioritizing the threat is more apparent and accurate. In addition, we optimize the rules of IBM-Q-Radar by using threat feeds generated at T-Eye platform. Furthermore, a huge amount of false positive alarms generated at IBM Q-Radar is reduced to a certain extent.
  •  
4.
  • Murtaza, Faizan, et al. (författare)
  • QoS-aware service provisioning in fog computing
  • 2020
  • Ingår i: Journal of Network and Computer Applications. - : Academic Press. - 1084-8045 .- 1095-8592. ; 165
  • Tidskriftsartikel (refereegranskat)abstract
    • Fog computing has emerged as a complementary solution to address the issues faced in cloud computing. While fog computing allows us to better handle time/delay-sensitive Internet of Everything (IoE) applications (e.g. smart grids and adversarial environment), there are a number of operational challenges. For example, the resource-constrained nature of fog-nodes and heterogeneity of IoE jobs complicate efforts to schedule tasks efficiently. Thus, to better streamline time/delay-sensitive varied IoE requests, the authors contributes by introducing a smart layer between IoE devices and fog nodes to incorporate an intelligent and adaptive learning based task scheduling technique. Specifically, our approach analyzes the various service type of IoE requests and presents an optimal strategy to allocate the most suitable available fog resource accordingly. We rigorously evaluate the performance of the proposed approach using simulation, as well as its correctness using formal verification. The evaluation findings are promising, both in terms of energy consumption and Quality of Service (QoS)
  •  
5.
  • Siddiqa, Aisha, et al. (författare)
  • Social Internet of Vehicles : Complexity, Adaptivity, Issues and Beyond
  • 2018
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers Inc.. - 2169-3536. ; 6, s. 62089-62106
  • Tidskriftsartikel (refereegranskat)abstract
    • Social Internet of Things (SIoT) is a specialized form of adaptive networks, where any change in one node can affect other nodes in the network. Millions of devices, including vehicles, buildings, healthcare, industries, and several other types of devices, share and exchange sensitive data among each other. Interconnection of these devices changes the paradigms of the world around us and puts a great effect on the overall society. The number of nodes, types of devices, layout of the overall network, and sensitivity of the data adds more and more complexity in the domain of SIoT. In this paper, our contribution is twofold, first, we provide a brief and comprehensive overview of the social aspects of the IoT by selecting the most recent papers to investigate the complexity, adaptivity, and other social aspects of the IoT and their implications. The main aim of this paper is to analyze the benefits of IoT to the society, social acceptance of IoTs, and social connectivity of different age groups. Second, we forecast the future trends and predict the world in the year 2020. We provide a detailed analysis by using several different data tables to present the future trends of different aspects of SIoT. With this survey, we aim to provide an easy and concise view of different challenges in implementing SIoT and how it will affect the future smart cities and overall impact on the society.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-5 av 5

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy