|
|
|
N?guessan Yves-Roland Douha, Masahiro Sasabe, Yuzo Taenaka and Youki Kadobayashi
In the digital era, smart-home users face growing threats from cyberattacks that threaten their privacy and security. Hence, it is essential for smart-home users to prioritize cybersecurity education and training to secure their homes. Despite this, the ...
ver más
|
|
|
|
|
|
Qi Deng and Feng Zeng
In big cities, there are more and more parking lots and charging piles for electric vehicles, and the resources of parking and charging vehicles can be aggregated to provide strong computing power for vehicular edge computing (VEC). In this paper, we pro...
ver más
|
|
|
|
|
|
Irina Makarova, Polina Buyvol, Larisa Gabsalikhova, Eduard Belyaev and Eduard Mukhametdinov
This article is devoted to the problem of determining the rational amount of spare parts in the warehouse of a service center of an automobile manufacturer?s branded network used for maintenance and current repairs. This problem was solved on the basis o...
ver más
|
|
|
|
|
|
Nida Zamir, Bakhtiar Ali, Muhammad Fasih Uddin Butt, Muhammad Awais Javed, Byung Moo Lee and Soon Xin Ng
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST) ...
ver más
|
|
|
|
|
|
Fatemeh Stodt and Christoph Reich
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i...
ver más
|
|
|