• A Sanitization Approach to Secure Shared Data in an IoT Environment 

      Lin, Chun Wei; Wu, Jimmy Ming-Tai; Fournier-Viger, Philippe; Djenouri, Youcef; Chen, Chun-Hao; Zhang, Yuyu (Journal article; Peer reviewed, 2019)
      Internet of Things (IoT) supports high flexibility and convenience in several applications because the IoT devices continuously transfer, share, and exchange data without human intervention. During shared or exchanged ...
    • Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing 

      Shabbir, Maryam; Shabbir, Ayesha; Iwendi, Celestine; Javed, Abdul Rehman; Rizwan, Muhammad; Herencsar, Norbert; Lin, Jerry Chun-Wei (Peer reviewed; Journal article, 2021)
      Despite the numerous and noticeable inherited gains of Mobile Cloud Computing (MCC) in healthcare, its growth is being hindered by privacy and security challenges. Such issues require the utmost urgent attention to realize ...
    • Multi-Network Vulnerability Causal Model for Infrastructure Co-Resilience 

      Konila Sriram, Lalitha Madhavi; Ulak, Mehmet Baran; Ozguven, Eren Erman; Arghandeh, Reza (Journal article; Peer reviewed, 2019)
      Resilience is mostly considered as a single-dimension attribute of a system. Most of the recent works on resilience treat it as a single-dimension attribute of a system or study the different dimensions of the resilience ...
    • Protecting Against Reflected Cross-Site Scripting Attacks 

      Ellingsen, Pål; Vikne, Andreas Svardal (Journal article; Peer reviewed, 2018)
      One of the most dominant threats against web applications is the class of script injection attacks, also called cross-site scripting. This class of attacks affects the client-side of a web application, and is a critical ...