|
|
|
Zvi Mendel, Hillary Voet, Ilan Nazarian, Svetlana Dobrinin and Dana Ment
The red palm weevil (Rhynchophorus ferrugineus) inflicts widespread damage in date palm plantations and urban settings, leading to stand loss and safety concerns, intensified by the economic and ecological burdens of synthetic preventive treatments. A no...
ver más
|
|
|
|
|
|
|
Maurizio Talamo, Franco Arcieri, Andrea Dimitri and Christian H. Schunck
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is ...
ver más
|
|
|
|
|
|
|
Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera and Manuel Ángel Serrano Martín
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using...
ver más
|
|
|
|
|
|
|
Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao and Yong-Yuan Deng
Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Thing...
ver más
|
|
|
|
|
|
|
Changui Lee and Seojeong Lee
The maritime industry, which transports approximately 90% of the world?s goods, plays a crucial role in the global economy. However, increasing reliance on digital technologies has made the industry vulnerable to cybersecurity threats that may compromise...
ver más
|
|
|
|
|
|
|
Pawel Dymora and Miroslaw Mazurek
Fractal and multifractal analysis can help to discover the structure of the communication system, and in particular the pattern and characteristics of traffic, in order to understand the threats better and detect anomalies in network operation. The massi...
ver más
|
|
|
|
|
|
|
Igor Kotenko, Olga Polubelova, Andrey Chechulin and Igor Saenko
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions imp...
ver más
|
|
|
|
|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
Jovana Mijalkovic and Angelo Spognardi
Network Intrusion Detection Systems (NIDS) represent a crucial component in the security of a system, and their role is to continuously monitor the network and alert the user of any suspicious activity or event. In recent years, the complexity of network...
ver más
|
|
|
|
|
|
|
Khalid Al-Begain, Murad Khan, Basil Alothman, Chibli Joumaa and Ebrahim Alrashed
The Internet of Things (IoT) has become an integral part of our daily life as it is growing in many fields, such as engineering, e-health, smart homes, smart buildings, agriculture, weather forecasting, etc. However, the growing number of IoT devices and...
ver más
|
|
|
|
|
|
|
Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo and Giuseppe Pirlo
The 0-day attack is a cyber-attack based on vulnerabilities that have not yet been published. The detection of anomalous traffic generated by such attacks is vital, as it can represent a critical problem, both in a technical and economic sense, for a sma...
ver más
|
|
|
|
|
|
|
Mounir Hafsa and Farah Jemili
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data ...
ver más
|
|
|
|
|
|
|
Zhibin Zhou, Pin Liu, Qin Liu and Guojun Wang
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security r...
ver más
|
|
|
|
|
|
|
Zhibin Zhou, Pin Liu, Qin Liu and Guojun Wang
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security r...
ver más
|
|
|
|
|
|
|
Yaping Zhu, Qiang Zhang, Yang Liu, Yancai Hu and Sihang Zhang
A new control algorithm was designed to solve the problems of actuator physical failure, remote network attack, and sudden change in trajectory curvature when a port?s artificial intelligence-based transportation robots track transportation in a freight ...
ver más
|
|
|
|