Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Secure e-Prescription Management System: Mitigating Blended Threat in IoBE

    Deukhun Kim1, Heejin Kim2, Jin Kwak3,*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2501-2519, 2023, DOI:10.32604/csse.2023.029356 - 01 August 2022

    Abstract New information and communication technologies (ICT) are being applied in various industries to upgrade the value of the major service items. Moreover, data collection, storage, processing, and security applications have led to the creation of an interrelated ICT environment in which one industry can directly influence the other. This is called the “internet of blended environments” (IoBE), as it is an interrelated data environment based on internet-of-things collection activities. In this environment, security incidents may increase as size and interconnectivity of attackable operations grow. Consequently, preemptive responses to combined security threats are needed to securely… More >

  • Open Access

    ARTICLE

    Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment

    Minkyung Lee1, Julian Jang-Jaccard2, Jin Kwak3,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 199-223, 2022, DOI:10.32604/cmc.2022.028495 - 18 May 2022

    Abstract New technologies that take advantage of the emergence of massive Internet of Things (IoT) and a hyper-connected network environment have rapidly increased in recent years. These technologies are used in diverse environments, such as smart factories, digital healthcare, and smart grids, with increased security concerns. We intend to operate Security Orchestration, Automation and Response (SOAR) in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged. To facilitate the understanding of the security concern involved in this newly… More >

Displaying 1-10 on page 1 of 2. Per Page