|
|
|
Abdul Majeed, Abdullah M. Alnajim, Athar Waseem, Aleem Khaliq, Aqdas Naveed, Shabana Habib, Muhammad Islam and Sheroz Khan
In fifth Generation (5G) networks, protection from internal attacks, external breaches, violation of confidentiality, and misuse of network vulnerabilities is a challenging task. Various approaches, especially deep-learning (DL) prototypes, have been ado...
ver más
|
|
|
|
|
|
|
Waqas Aman and Einar Snekkenes
In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furtherm...
ver más
|
|
|
|
|
|
|
Waqas Aman and Einar Snekkenes
|
|
|
|
|
|
|
Antti Evesti, Jani Suomalainen and Eila Ovaska
-
|
|
|
|
|
|
|
Rasheed Gbenga Jimoh, Olayinka Olufunmilayo Olusanya, Joseph Bamidele Awotunde, Agbotiname Lucky Imoize and Cheng-Chi Lee
In the field of software development, the efficient prioritizing of software risks was essential and play significant roles. However, finding a viable solution to this issue is a difficult challenge. The software developers have to adhere strictly to ris...
ver más
|
|
|
|
|
|
|
Svetlana Boudko, Peder Aursand and Habtamu Abie
We applied evolutionary game theory to extend a resource constrained security game model for confidentiality attacks and defenses in an Advanced Metering Infrastructure (AMI), which is a component of IoT-enabled Smart Grids. The AMI is modeled as a tree ...
ver más
|
|
|
|
|
|
|
Donovan Campbell and Clinton Beckford
In recent years, Jamaica has been seriously affected by a number of extreme meteorological events. The one discussed here, Hurricane Dean, passed along the south coast of the island in August 2007, damaging crops and disrupting livelihood activities for ...
ver más
|
|
|
|
|
|
|
Konstantinos Demertzis, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez and Lazaros Iliadis
|
|
|
|
|
|
|
Konstantinos Demertzis, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez and Lazaros Iliadis
A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization?s security posture on an ongoing basis. The SOC staff works closely with incident response teams, securit...
ver más
|
|
|
|
|
|
|
Tri Hoang Vo, Woldemar Fuhrmann, Klaus-Peter Fischer-Hellmann and Steven Furnell
In recent years, enterprise applications have begun to migrate from a local hosting to a cloud provider and may have established a business-to-business relationship with each other manually. Adaptation of existing applications requires substantial implem...
ver más
|
|
|
|
|
|
|
Konstantinos Demertzis, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez and Lazaros Iliadis
|
|
|
|
|
|
|
Guoqing Zhang, Shilin Yin, Chenfeng Huang and Weidong Zhang
This paper focuses on the intervehicle security-based robust formation control of unmanned surface vehicles (USVs) to implement the formation switch mission. In the scheme, a novel adaptive potential ship (APS)-based guidance principle is developed to pr...
ver más
|
|
|
|
|
|
|
Xue Jun Li, Maode Ma and Yihan Sun
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, mu...
ver más
|
|
|
|
|
|
|
Maki Kihara and Satoshi Iriyama
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain cryp...
ver más
|
|
|
|
|
|
|
Yunusa Simpa Abdulsalam and Mustapha Hedabou
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of t...
ver más
|
|
|
|
|
|
|
Irawan Dwi Wahyono,Djoko Saryono,Khoirudin Asfani,Muhammad Ashar,Sunarti Sunarti
Pág. pp. 29 - 40
Computer network security has become an important issue in recent decades, the government and several international organizations have invested in professional education and training for computer network security. In addition, with the increasing inciden...
ver más
|
|
|
|
|
|
|
Yurii Kharazishvili, Andrii Shevchenko
Pág. 7 - 17
The concept of strategic planning of sustainable development on the example of the railway transport of Ukraine from the standpoint of economic security, which includes methodology, methods and principles of research through the identification of the lev...
ver más
|
|
|
|
|
|
|
Yurii Kharazishvili, Andrii Shevchenko
Pág. 7 - 17
The concept of strategic planning of sustainable development on the example of the railway transport of Ukraine from the standpoint of economic security, which includes methodology, methods and principles of research through the identification of the lev...
ver más
|
|
|
|
|
|
|
Zhigang Song, Daisong Li, Zhongyou Chen and Wenqin Yang
The unsupervised domain-adaptive vehicle re-identification approach aims to transfer knowledge from a labeled source domain to an unlabeled target domain; however, there are knowledge differences between the target domain and the source domain. To mitiga...
ver más
|
|
|
|
|
|
|
Wen-Chieh Chen, Chun-Liang Lin, Yang-Yi Chen and Hsin-Hsu Cheng
Unmanned aerial vehicles (UAVs) are becoming popular in various applications. However, there are still challenging issues to be tackled, such as effective obstacle avoidance, target identification within a crowd, and specific target tracking. This paper ...
ver más
|
|
|
|