Skip to main content

Showing 1–2 of 2 results for author: Syed, N F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2010.05144  [pdf, ps, other

    cs.CR

    Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication

    Authors: Syed W. Shah, Naeem F. Syed, Arash Shaghaghi, Adnan Anwar, Zubair Baig, Robin Doss

    Abstract: Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched human user characteristics-based CA mechanisms cannot be extended to continuously authenticate Internet of Things (IoT) devices. The challenges are ex… ▽ More

    Submitted 10 October, 2020; originally announced October 2020.

    Comments: This is a copy of the accepted version at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020) [Core Rank: A]

  2. arXiv:2007.09342  [pdf, other

    cs.CR

    Toward a Deep Learning-Driven Intrusion Detection Approach for Internet of Things

    Authors: Mengmeng Ge, Naeem Firdous Syed, Xi** Fu, Zubair Baig, Antonio Robles-Kelly

    Abstract: Internet of Things (IoT) has brought along immense benefits to our daily lives encompassing a diverse range of application domains that we regularly interact with, ranging from healthcare automation to transport and smart environments. However, due to the limitation of constrained resources and computational capabilities, IoT networks are prone to various cyber attacks. Thus, defending the IoT net… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.