60   Artículos

« Anterior     Página: 1 de 4     Siguiente »

 
en línea
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan    
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Waqas Aman and Einar Snekkenes    
In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furtherm... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Waqas Aman and Einar Snekkenes    
Revista: Future Internet    Formato: Electrónico

 
en línea
Antti Evesti, Jani Suomalainen and Eila Ovaska    
-
Revista: Computers    Formato: Electrónico

 
en línea
Rasheed Gbenga Jimoh, Olayinka Olufunmilayo Olusanya, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize and Cheng-Chi Lee    
In the field of software development, the efficient prioritizing of software risks was essential and play significant roles. However, finding a viable solution to this issue is a difficult challenge. The software developers have to adhere strictly to ris... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Svetlana Boudko, Peder Aursand and Habtamu Abie    
We applied evolutionary game theory to extend a resource constrained security game model for confidentiality attacks and defenses in an Advanced Metering Infrastructure (AMI), which is a component of IoT-enabled Smart Grids. The AMI is modeled as a tree ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Donovan Campbell and Clinton Beckford    
In recent years, Jamaica has been seriously affected by a number of extreme meteorological events. The one discussed here, Hurricane Dean, passed along the south coast of the island in August 2007, damaging crops and disrupting livelihood activities for ... ver más
Revista: Sustainability    Formato: Electrónico

 
en línea
Konstantinos Demertzis, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez and Lazaros Iliadis    
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Konstantinos Demertzis, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez and Lazaros Iliadis    
A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization?s security posture on an ongoing basis. The SOC staff works closely with incident response teams, securit... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Tri Hoang Vo, Woldemar Fuhrmann, Klaus-Peter Fischer-Hellmann and Steven Furnell    
In recent years, enterprise applications have begun to migrate from a local hosting to a cloud provider and may have established a business-to-business relationship with each other manually. Adaptation of existing applications requires substantial implem... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Konstantinos Demertzis, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez and Lazaros Iliadis    
Revista: Buildings    Formato: Electrónico

 
en línea
Guoqing Zhang, Shilin Yin, Chenfeng Huang and Weidong Zhang    
This paper focuses on the intervehicle security-based robust formation control of unmanned surface vehicles (USVs) to implement the formation switch mission. In the scheme, a novel adaptive potential ship (APS)-based guidance principle is developed to pr... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Xue Jun Li, Maode Ma and Yihan Sun    
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, mu... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Maki Kihara and Satoshi Iriyama    
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain cryp... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yunusa Simpa Abdulsalam and Mustapha Hedabou    
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of t... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Irawan Dwi Wahyono,Djoko Saryono,Khoirudin Asfani,Muhammad Ashar,Sunarti Sunarti     Pág. pp. 29 - 40
Computer network security has become an important issue in recent decades, the government and several international organizations have invested in professional education and training for computer network security. In addition, with the increasing inciden... ver más

 
en línea
Yurii Kharazishvili, Andrii Shevchenko     Pág. 7 - 17
The concept of strategic planning of sustainable development on the example of the railway transport of Ukraine from the standpoint of economic security, which includes methodology, methods and principles of research through the identification of the lev... ver más
Revista: Research Papers in Economics and Finance    Formato: Electrónico

 
en línea
Yurii Kharazishvili, Andrii Shevchenko     Pág. 7 - 17
The concept of strategic planning of sustainable development on the example of the railway transport of Ukraine from the standpoint of economic security, which includes methodology, methods and principles of research through the identification of the lev... ver más
Revista: Research Papers in Economics and Finance    Formato: Electrónico

 
en línea
Zhigang Song, Daisong Li, Zhongyou Chen and Wenqin Yang    
The unsupervised domain-adaptive vehicle re-identification approach aims to transfer knowledge from a labeled source domain to an unlabeled target domain; however, there are knowledge differences between the target domain and the source domain. To mitiga... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Wen-Chieh Chen, Chun-Liang Lin, Yang-Yi Chen and Hsin-Hsu Cheng    
Unmanned aerial vehicles (UAVs) are becoming popular in various applications. However, there are still challenging issues to be tackled, such as effective obstacle avoidance, target identification within a crowd, and specific target tracking. This paper ... ver más
Revista: Aerospace    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »