15   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Zvi Mendel, Hillary Voet, Ilan Nazarian, Svetlana Dobrinin and Dana Ment    
The red palm weevil (Rhynchophorus ferrugineus) inflicts widespread damage in date palm plantations and urban settings, leading to stand loss and safety concerns, intensified by the economic and ecological burdens of synthetic preventive treatments. A no... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Maurizio Talamo, Franco Arcieri, Andrea Dimitri and Christian H. Schunck    
Public key infrastructures (PKIs) are the cornerstone for the security of the communication layer of online services relying on certificate-based authentication, such as e-commerce, e-government, online banking, cloud services, and many others. A PKI is ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, Azzurra Ragone, Michele Scalera and Manuel Ángel Serrano Martín    
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao and Yong-Yuan Deng    
Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Thing... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Changui Lee and Seojeong Lee    
The maritime industry, which transports approximately 90% of the world?s goods, plays a crucial role in the global economy. However, increasing reliance on digital technologies has made the industry vulnerable to cybersecurity threats that may compromise... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Pawel Dymora and Miroslaw Mazurek    
Fractal and multifractal analysis can help to discover the structure of the communication system, and in particular the pattern and characteristics of traffic, in order to understand the threats better and detect anomalies in network operation. The massi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Igor Kotenko, Olga Polubelova, Andrey Chechulin and Igor Saenko    
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions imp... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jovana Mijalkovic and Angelo Spognardi    
Network Intrusion Detection Systems (NIDS) represent a crucial component in the security of a system, and their role is to continuously monitor the network and alert the user of any suspicious activity or event. In recent years, the complexity of network... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Khalid Al-Begain, Murad Khan, Basil Alothman, Chibli Joumaa and Ebrahim Alrashed    
The Internet of Things (IoT) has become an integral part of our daily life as it is growing in many fields, such as engineering, e-health, smart homes, smart buildings, agriculture, weather forecasting, etc. However, the growing number of IoT devices and... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Francesco Carrera, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo and Giuseppe Pirlo    
The 0-day attack is a cyber-attack based on vulnerabilities that have not yet been published. The detection of anomalous traffic generated by such attacks is vital, as it can represent a critical problem, both in a technical and economic sense, for a sma... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mounir Hafsa and Farah Jemili    
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Zhibin Zhou, Pin Liu, Qin Liu and Guojun Wang    
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security r... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhibin Zhou, Pin Liu, Qin Liu and Guojun Wang    
As more and more items are tagged with RFID (Radio Frequency Identification) tags, grouping-proof technology is widely utilized to provide a coexistence evidence for a group of related items. Due to the wireless channel used in RFID systems, a security r... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yaping Zhu, Qiang Zhang, Yang Liu, Yancai Hu and Sihang Zhang    
A new control algorithm was designed to solve the problems of actuator physical failure, remote network attack, and sudden change in trajectory curvature when a port?s artificial intelligence-based transportation robots track transportation in a freight ... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »