15   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Daniele Codetta-Raiteri    
Revista: Information    Formato: Electrónico

 
en línea
Yongjing Wang, Yi Wang and Xiaoliang Feng    
In this work, the ship relative integrated navigation approaches are studied for the navigation scenarios with the measurements disturbed by unknown statistical property noises and with the injected fault measurement attacks. On the basis of the limited ... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Viacheslav Moskalenko, Vyacheslav Kharchenko, Alona Moskalenko and Borys Kuzikov    
Artificial intelligence systems are increasingly being used in industrial applications, security and military contexts, disaster response complexes, policing and justice practices, finance, and healthcare systems. However, disruptions to these systems ca... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Kazuki Nakamura, Koji Hori and Shoichi Hirose    
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jian Wang and Ying Li    
Ensuring the security of IoT devices and chips at runtime has become an urgent task as they have been widely used in human life. Embedded memories are vital components of SoC (System on Chip) in these devices. If they are attacked or incur faults at runt... ver más
Revista: Information    Formato: Electrónico

 
en línea
Antoine Rauzy and Liu Yang    
In this article, we propose decision diagram algorithms to extract minimal cutsets of finite degradation models. Finite degradation models generalize and unify combinatorial models used to support probabilistic risk, reliability and safety analyses (faul... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yaqi Song and Li Yang    
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper. We first cons... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shenghan Zhou, Tianhuai Wang, Linchao Yang, Zhao He and Siting Cao    
This paper aims to build a Self-supervised Fault Detection Model for UAVs combined with an Auto-Encoder. With the development of data science, it is imperative to detect UAV faults and improve their safety. Many factors affect the fault of a UAV, such as... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Moritz Platt and Peter McBurney    
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following the proposal of ?Bitcoin? led to a sharp increase in research activity ... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Amthal K. Mousa and Mohammed Najm Abdullah    
The software defined network (SDN) collects network traffic data and proactively manages networks. SDN?s programmability makes it excellent for developing distributed applications, cybersecurity, and decentralized network control in multitenant data cent... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rajakannu Amuthakkannan, K. Vijayalakshmi, Saleh Al Araimi and Maamar Ali Saud Al Tobi    
Fishing wealth is one of the richest resources in the Sultanate of Oman. It is considered as one of the most important economic developments that nation depends on in a larger way. The Sultanate of Oman is characterized by the presence of a large fishing... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Ramraj Dangi, Akshay Jadhav, Gaurav Choudhary, Nicola Dragoni, Manas Kumar Mishra and Praveen Lalwani    
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mounir Hafsa and Farah Jemili    
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Nur Arifin Akbar, Amgad Muneer, Narmine ElHakim and Suliman Mohamed Fati    
Blockchain technology is a sustainable technology that offers a high level of security for many industrial applications. Blockchain has numerous benefits, such as decentralisation, immutability and tamper-proofing. Blockchain is composed of two processes... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yaping Zhu, Qiang Zhang, Yang Liu, Yancai Hu and Sihang Zhang    
A new control algorithm was designed to solve the problems of actuator physical failure, remote network attack, and sudden change in trajectory curvature when a port?s artificial intelligence-based transportation robots track transportation in a freight ... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »