Now showing items 1-4 of 4
Scalable and Secure Learning with Limited Supervision over Data Streams
Applications that employ machine learning over a stream of data provide the knowledge necessary for its users to make informed decisions at the right time. With the advantages of cloud computing infrastructure, these ...
Vulnerability Trends in IoT Devices and New Sensor-Assisted Security Protections
Internet of Things (IoT) devices are found everywhere: in our houses as voice-assistant devices, home automation smart devices, or smart appliances. As our lives become more dependent on these systems, their security has ...
Enhancing Cybersecurity with Encrypted Traffic Fingerprinting
Recently, network traffic analysis and cyber deception have been increasingly used in various applications to protect people, information, and systems from major cyber threats. Network traffic ﬁngerprinting is a traffic ...
Behavioral Language Converter to Improve HLS Quality of Results
High Level Synthesis (HLS) is one of the most emerging fields of research that is helping the industries to reduce the time-to-market constraint. With the advancement of the HLS, till now approximately 100 companies have ...