Skip to main content

Showing 1–12 of 12 results for author: Zolanvari, M

Searching in archive cs. Search in all archives.
.
  1. Recent Advances in the Internet of Medical Things (IoMT) Systems Security

    Authors: Ali Ghubaish, Tara Salman, Maede Zolanvari, Devrim Unal, Abdulla Al-Ali, Raj Jain

    Abstract: The rapid evolutions in micro-computing, mini-hardware manufacturing, and machine to machine (M2M) communications have enabled novel Internet of Things (IoT) solutions to reshape many networking applications. Healthcare systems are among these applications that have been revolutionized with IoT, introducing an IoT branch known as the Internet of Medical Things (IoMT) systems. IoMT systems allow re… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

    Journal ref: IEEE Internet of Things Journal (Volume: 8, Issue: 11, 01 June 2021)

  2. arXiv:2205.01232  [pdf, other

    cs.AI cs.IT

    TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security

    Authors: Maede Zolanvari, Zebo Yang, Khaled Khan, Raj Jain, Nader Meskin

    Abstract: Despite AI's significant growth, its "black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical systems, and financial applications, etc. Explainable AI (XAI) has emerged to help with this problem. However, designing appropriately fast and accurate XAI is st… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  3. arXiv:2205.01231  [pdf, other

    cs.DC cs.AI

    ADDAI: Anomaly Detection using Distributed AI

    Authors: Maede Zolanvari, Ali Ghubaish, Raj Jain

    Abstract: When dealing with the Internet of Things (IoT), especially industrial IoT (IIoT), two manifest challenges leap to mind. First is the massive amount of data streaming to and from IoT devices, and second is the fast pace at which these systems must operate. Distributed computing in the form of edge/cloud structure is a popular technique to overcome these two challenges. In this paper, we propose ADD… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

  4. arXiv:2002.04124  [pdf

    cs.CR cs.NI eess.SY

    Cybersecurity for Industrial Control Systems: A Survey

    Authors: Deval Bhamare, Maede Zolanvari, Aiman Erbad, Raj Jain, Khaled Khan, Nader Meskin

    Abstract: Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). ICSs are often found in the industrial sectors and critical infrastructures, such as nuclear and thermal plants, water treatment facilities, power generation,… ▽ More

    Submitted 10 February, 2020; originally announced February 2020.

  5. Potential Data Link Candidates for Civilian Unmanned Aircraft Systems: A Survey

    Authors: Maede Zolanvari, Raj Jain, Tara Salman

    Abstract: This survey studies the potential data link candidates for unmanned aircraft vehicles (UAVs). There has been tremendous growth in different applications of UAVs such as lifesaving and rescue missions, commercial use, recreations, etc. Unlike the traditional wireless communications, the data links for these systems do not have any general standardized framework yet to ensure safe co-existence of UA… ▽ More

    Submitted 18 April, 2020; v1 submitted 31 December, 2019; originally announced December 2019.

    Journal ref: in IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 292-319, Firstquarter 2020

  6. arXiv:1912.03213  [pdf

    cs.NI cs.PF eess.SY

    Analysis of AeroMACS Data Link for Unmanned Aircraft Vehicles

    Authors: Maede Zolanvari, Marcio A. Teixeira, Raj Jain

    Abstract: Aeronautical Mobile Airport Communications System (AeroMACS) is based on the IEEE 802.16e mobile wireless standard commonly known as WiMAX. It is expected to be the main part of the next-generation aviation communication system to support fixed and mobile services for manned and unmanned applications. AeroMACS will be an essential technology helping pave the way toward full integration of Unmanned… ▽ More

    Submitted 6 December, 2019; originally announced December 2019.

  7. arXiv:1912.02651  [pdf

    cs.CR cs.DB cs.LG eess.SY

    Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning

    Authors: Maede Zolanvari, Marcio A. Teixeira, Raj Jain

    Abstract: Machine learning algorithms have been shown to be suitable for securing platforms for IT systems. However, due to the fundamental differences between the industrial internet of things (IIoT) and regular IT networks, a special performance review needs to be considered. The vulnerabilities and security requirements of IIoT systems demand different considerations. In this paper, we study the reasons… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1911.05771

  8. arXiv:1911.05771  [pdf

    cs.CR cs.LG cs.NI

    Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

    Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain

    Abstract: It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning and big data analytics are the two powerful leverages for analyzing and securing the Internet of Things (IoT) technology. By extension, these techniques can help improve the security of the IIoT systems as well. In this paper, we first pre… ▽ More

    Submitted 13 November, 2019; originally announced November 2019.

    Journal ref: in IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6822-6834, Aug. 2019

  9. arXiv:1909.03613  [pdf, other

    cs.CV cs.AI cs.CG cs.LG

    DublinCity: Annotated LiDAR Point Cloud and its Applications

    Authors: S. M. Iman Zolanvari, Susana Ruano, Aakanksha Rana, Alan Cummins, Rogerio Eduardo da Silva, Morteza Rahbar, Aljosa Smolic

    Abstract: Scene understanding of full-scale 3D models of an urban area remains a challenging task. While advanced computer vision techniques offer cost-effective approaches to analyse 3D urban elements, a precise and densely labelled dataset is quintessential. The paper presents the first-ever labelled dataset for a highly dense Aerial Laser Scanning (ALS) point cloud at city-scale. This work introduces a n… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

    Comments: Accepted to the 30th British Machine Vision Conference

  10. SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

    Authors: Marcio Andrey Teixeira, Tara Salman, Maede Zolanvari, Raj Jain, Nader Meskin, Mohammed Samaka

    Abstract: This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against the testbed. During the attacks, the network traffic was captured, and features… ▽ More

    Submitted 10 February, 2019; originally announced April 2019.

    Comments: E-Preprint

    Journal ref: Future Internet 2018, 10(8), 76

  11. Efficient Virtual Network Function Placement Strategies for Cloud Radio Access Networks

    Authors: Deval Bhamare, Aiman Erbad, Raj Jain, Maede Zolanvari, Mohammed Samaka

    Abstract: The new generation of 5G mobile services places stringent requirements for cellular network operators in terms of latency and costs. The latest trend in radio access networks (RANs) is to pool the baseband units (BBUs) of multiple radio base stations and to install them in a centralized infrastructure, such as a cloud, for statistical multiplexing gains. The technology is known as Cloud Radio Acce… ▽ More

    Submitted 10 February, 2019; originally announced March 2019.

    Comments: E-preprint

    Journal ref: Computer Communications, Volume 127, May 2018, pp. 50-60

  12. Security Services Using Blockchains: A State of the Art Survey

    Authors: Tara Salman, Maede Zolanvari, Aiman Erbad, Raj Jain, Mohammed Samaka

    Abstract: This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy, and access control list (ACL), data and resource provenance, and integrity assurance. All these services are critical for the current distributed applications, especially due to the large amount of data being processed over the networks and the use of clo… ▽ More

    Submitted 19 October, 2018; originally announced October 2018.

    Comments: COMST 2018 accepted paper

    Journal ref: IEEE Communications Surveys & Tutorials 2018