Skip to main content

Research Repository

Advanced Search

All Outputs (2)

A hierarchical key pre-distribution scheme for fog networks (2018)
Journal Article
Nikkhah Bahrami, P., Javadi, H., Dargahi, T., Dehghantanha, A., & Choo, K. (2019). A hierarchical key pre-distribution scheme for fog networks. Concurrency and Computation: Practice and Experience, 31(22), e4776. https://doi.org/10.1002/cpe.4776

Security in fog computing is multi-faceted, and one particular challenge is establishing a secure communication channel between fog nodes and end devices. This emphasizes the importance of designing efficient and secret key distribution scheme to fac... Read More about A hierarchical key pre-distribution scheme for fog networks.

Deep dive into ransomware threat hunting and intelligence at fog layer (2018)
Journal Article
Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, M., Khayami, R., Choo, K., & Newton, D. (2018). Deep dive into ransomware threat hunting and intelligence at fog layer. Future Generation Computer Systems, 90(Jan 19), 94-104. https://doi.org/10.1016/j.future.2018.07.045

Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such nodes typically contain considerably amount of sensitive data. The capability to efficiently hunt abnormalities relating to ransomwar... Read More about Deep dive into ransomware threat hunting and intelligence at fog layer.