Ultime pubblicazioni e brevetti sulla sicurezza delle informazioni (InfoSec)

. Ultime pubblicazioni e brevetti sulla sicurezza informatica (InfoSec). Blockchain

Mancia: Oltre a questa selezione sull'Aeronautica, è possibile cercare e filtrare i nostri prodotti:
    * Strumento di ricerca di pubblicazioni gratuite per autore, argomento, parole chiave, data o rivista.
    * Strumento di ricerca brevetti gratuito per i brevetti in inglese dell'Ufficio Europeo dei Brevetti.

This is our latest selection of worldwide publications and patents in english on Information Security (InfoSec), between many scientific online journals, classified and focused on information security, infosec, ransomware, authentication, phishing, malware, firewall, crittografia, intrusion detection, intrusion prevention, zero-day exploit, multi-factor authentication, public key, private key, access control, denial of service, social engineering, security awareness, encryption, CIA triad, antivirus and cipher.

Brevetti: non recente brevetto su questo particolare argomento. Provate a effettuare una ricerca manuale approfondita nel Database dei brevetti, linkato poco sopra.

Blockchain-Enabled Federated Learning with Knowledge Distillation for Intrusion Detection

Published on 2025-02-17 by Mohammed Shalan, Md Rakibul Hasan, Yan Bai, Juan Li @MDPI

Abstract: The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. This study addresses these challenges by presenting a federated learning framework enhanced with blockchain technology to detect intrusions in smart home environments. The proposed approach combines knowledge distillation and transfer learning to support heterogeneous IoT devices with varying computational capacities, ensuring efficient local training wit[...]


Our summary: Study presents a blockchain-enabled federated learning framework for detecting intrusions in smart home environments. The approach combines knowledge distillation and transfer learning to support heterogeneous IoT devices, ensuring efficient local training without compromising privacy. Results show significant improvements in intrusion detection accuracy, particularly for resource-constrained devices.

Blockchain, Federated Learning, Knowledge Distillation, Intrusion Detection

Publication

A Blockchain-Based Smart Contract Approach

Published on 2025-02-15 by Abdullahi Chowdhury, Sakib Shahriar Shafin, Saleh Masum, Joarder Kamruzzaman, Shi Dong @MDPI

Abstract: Increasing adoption of electric vehicles (EVs) and the expansion of EV charging infrastructure present opportunities for enhancing sustainable transportation within smart cities. However, the interconnected nature of EV charging stations (EVCSs) exposes this infrastructure to various cyber threats, including false data injection, man-in-the-middle attacks, malware intrusions, and denial of service attacks. Financial attacks, such as false billing and theft of credit card information, also pose s[...]


Our summary: Blockchain-based smart contract approach for enhancing sustainable transportation within smart cities, mitigating cyber threats in EV charging stations, and increasing user trust in EVCS systems.

Blockchain, Smart Contract, Hyperledger Fabric, EV Charging Infrastructure

Publication

Table of Contents
    Aggiungi un'intestazione per iniziare a generare il sommario

    SFIDA DI DESIGN o DI PROGETTO?
    Ingegnere meccanico, responsabile di progetto o di ricerca e sviluppo
    Sviluppo efficace del prodotto

    Disponibile per una nuova sfida con breve preavviso in Francia e Svizzera.
    Contattami su LinkedIn
    Prodotti in plastica e metallo, Design-to-cost, Ergonomia, Volume medio-alto, Settori regolamentati, CE e FDA, CAD, Solidworks, Lean Sigma Black Belt, ISO 13485 Classe II e III

    Stiamo cercando un nuovo sponsor

     

    La tua azienda o istituzione si occupa di tecnica, scienza o ricerca?
    > inviaci un messaggio <

    Argomenti trattati: Information Security, IoT, Blockchain, Dynamic Attribute-Based Access Control, Zero-Trust, Edge Computing, Fog Computing, 6G Networks, Cyber Threats, Access Control, Multi-Factor Authentication, Anomaly Detection, Encryption, Digital Documents, GPS, Quick Response Code, MMP8, and Glycocalyx..

    Torna in alto

    Potrebbe anche piacerti