|
|
|
Jingjing Hao and Guangsheng Han
As the intelligent car-networking represents the new direction of the future vehicular development, automotive security plays an increasingly important role in the whole car industry chain. On condition that the accompanying problems of security are proo...
ver más
|
|
|
|
|
|
|
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ...
ver más
|
|
|
|
|
|
|
Ivan Nedyalkov
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power ...
ver más
|
|
|
|
|
|
|
Amirhossein Javaherikhah, Mercedes Valiente Lopez and Saeed Reza Mohandes
Due to the unique atmospheric conditions on Mars, the management of essential information in Mars buildings is of great importance. Even the smallest error or manipulation of data can create irreparable risks for residents. Martian buildings require a st...
ver más
|
|
|
|
|
|
|
Jamal Khudair Madhloom, Zainab Hammoodi Noori, Sif K. Ebis, Oday A. Hassen and Saad M. Darwish
Due to the Internet?s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive data secur...
ver más
|
|
|
|
|
|
|
Andrés Goyburo, Pedro Rau, Waldo Lavado-Casimiro, Wouter Buytaert, José Cuadros-Adriazola and Daniel Horna
Water is an essential resource for social and economic development. The availability of this resource is constantly threatened by the rapid increase in its demand. This research assesses current (2010?2016), short- (2017?2040), middle- (2041?2070), and l...
ver más
|
|
|
|
|
|
|
Andrei Brazhuk
Pág. 36 - 41
This work considers challenges, related to the lack of methods of automatic threat modeling and well-formed data sources of threats and countermeasures as well as techniques to collect such security knowledge. Cloud computing domain has&nb...
ver más
|
|
|
|
|
|
|
Stef Janssen, Diogo Matias and Alexei Sharpanskykh
Airports are attractive targets for terrorists, as they are designed to accommodate and process large amounts of people, resulting in a high concentration of potential victims. A popular method to mitigate the risk of terrorist attacks is through securit...
ver más
|
|
|
|
|
|
|
Oleksandr Milov,Serhii Yevseiev,Volodymyr Aleksiyev,Polina Berdnik,Oleksandr Voitko,Valentyn Dyptan,Yevheniia Ivanchenko,Maxim Pavlenko,Anatolii Salii,Serhiy Yarovyy
Pág. 46 - 57
The results of modeling and analysis of scenarios of the behavior of interacting agents in conditions of cyber conflict are presented. General approaches to the development of a scenario of the behavior of antagonistic agents are presented. The definitio...
ver más
|
|
|
|
|
|
|
Oleksandr Milov,Serhii Yevseiev,Andrii Vlasov,Sergey Herasimov,Oleh Dmitriiev,Maksym Kasianenko,Hennady Pievtsov,Yevhen Peleshok,Yuliia Tkach,Serhii Faraon
Pág. 53 - 64
The results of the development of tools for scenario modeling based on formal grammars are presented. The works related to various ways of scenario description in their development systems are analyzed. For the natural language description of scenarios, ...
ver más
|
|
|
|
|
|
|
Abel Yeboah-Ofori and Shareeful Islam
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution co...
ver más
|
|
|
|
|
|
|
Fathi Amsaad, Mohammed Niamat, Amer Dawoud and Selcuk Kose
-
|
|
|
|
|
|
|
Fathi Amsaad, Mohammed Niamat, Amer Dawoud and Selcuk Kose
Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to impro...
ver más
|
|
|
|
|
|
|
Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki and Madiha H. Syed
Clouds do not work in isolation but interact with other clouds and with a variety of systems either developed by the same provider or by external entities with the purpose to interact with them; forming then an ecosystem. A software ecosystem is a collec...
ver más
|
|
|
|
|
|
|
Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki and Madiha H. Syed
|
|
|
|
|
|
|
Md. Abu Syed and M. Al Amin
Bangladesh has been experiencing increased temperature and change in precipitation regime, which might adversely affect the important ecosystems in the country differentially. The river flows and groundwater recharge over space and time are determined by...
ver más
|
|
|
|
|
|
|
A. O. Novikov, M. M. Novikova
Pág. 42 - 49
|
|
|
|
|
|
|
Ye. P. Blokhin,K. I. Zheleznov,L. V. Ursuliak,Ya. N. Romaniuk
Pág. 48 - 55
The description of the developed computer software package and its use to solve problems of motion safety and stability is given.
|
|
|
|
|
|
|
A. O. Novikov,M. M. Novikova
Pág. 42 - 49
|
|
|
|
|
|
|
Aakarsh Rao, Nadir A. Carreón, Roman Lysecky and Jerzy Rozenblit
Life-critical embedded systems, including medical devices, are becoming increasingly interconnected and interoperable, providing great efficiency to the healthcare ecosystem. These systems incorporate complex software that plays a significantly integrati...
ver más
|
|
|
|