Últimas publicaciones y patentes sobre seguridad de la información (InfoSec)

. Últimas publicaciones y patentes sobre seguridad de la información (InfoSec). Blockchain

Consejo: además de esta selección sobre Aeronáutica, puede buscar y filtrar nuestros:
    * herramienta gratuita de búsqueda de publicaciones * por autor, tema, palabras clave, fecha o revista.
    * herramienta gratuita de búsqueda de patentes * para patentes en inglés de la Oficina Europea de Patentes.

This is our latest selection of worldwide publications and patents in english on Information Security (InfoSec), between many scientific online journals, classified and focused on information security, infosec, ransomware, authentication, phishing, malware, firewall, encriptación, intrusion detection, intrusion prevention, zero-day exploit, multi-factor authentication, public key, private key, access control, denial of service, social engineering, security awareness, encryption, CIA triad, antivirus and cipher.

Patentes: no reciente patente sobre este tema concreto. Intente realizar una búsqueda manual exhaustiva en la base de datos de patentes a la que se hace referencia más arriba.

Blockchain-Enabled Federated Learning with Knowledge Distillation for Intrusion Detection

Published on 2025-02-17 by Mohammed Shalan, Md Rakibul Hasan, Yan Bai, Juan Li @MDPI

Abstract: The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. This study addresses these challenges by presenting a federated learning framework enhanced with blockchain technology to detect intrusions in smart home environments. The proposed approach combines knowledge distillation and transfer learning to support heterogeneous IoT devices with varying computational capacities, ensuring efficient local training wit[...]


Our summary: Study presents a blockchain-enabled federated learning framework for detecting intrusions in smart home environments. The approach combines knowledge distillation and transfer learning to support heterogeneous IoT devices, ensuring efficient local training without compromising privacy. Results show significant improvements in intrusion detection accuracy, particularly for resource-constrained devices.

Blockchain, Federated Learning, Knowledge Distillation, Intrusion Detection

Publication

A Blockchain-Based Smart Contract Approach

Published on 2025-02-15 by Abdullahi Chowdhury, Sakib Shahriar Shafin, Saleh Masum, Joarder Kamruzzaman, Shi Dong @MDPI

Abstract: Increasing adoption of electric vehicles (EVs) and the expansion of EV charging infrastructure present opportunities for enhancing sustainable transportation within smart cities. However, the interconnected nature of EV charging stations (EVCSs) exposes this infrastructure to various cyber threats, including false data injection, man-in-the-middle attacks, malware intrusions, and denial of service attacks. Financial attacks, such as false billing and theft of credit card information, also pose s[...]


Our summary: Blockchain-based smart contract approach for enhancing sustainable transportation within smart cities, mitigating cyber threats in EV charging stations, and increasing user trust in EVCS systems.

Blockchain, Smart Contract, Hyperledger Fabric, EV Charging Infrastructure

Publication

Table of Contents
    Añadir una cabecera para empezar a generar el índice

    ¿DISEÑO o RETO DE PROYECTO?
    Ingeniero Mecánico, Gerente de Proyectos o de I+D
    Desarrollo eficaz de productos

    Disponible para un nuevo desafío a corto plazo en Francia y Suiza.
    Contáctame en LinkedIn
    Productos de plástico y metal, Diseño a coste, Ergonomía, Volumen medio a alto, Industrias reguladas, CE y FDA, CAD, Solidworks, Lean Sigma Black Belt, ISO 13485 Clase II y III médica

    Estamos buscando un nuevo patrocinador

     

    ¿Su empresa o institución se dedica a la técnica, la ciencia o la investigación?
    > Envíanos un mensaje <

    Temas tratados: Information Security, IoT, Blockchain, Dynamic Attribute-Based Access Control, Zero-Trust, Edge Computing, Fog Computing, 6G Networks, Cyber Threats, Access Control, Multi-Factor Authentication, Anomaly Detection, Encryption, Digital Documents, GPS, Quick Response Code, MMP8, and Glycocalyx..

    Scroll al inicio

    También te puede interesar