|
|
|
Yajing Wang, Yaodong Yang, Shuaipeng Suo, Mingyuan Wang and Weifeng Rao
As three-dimensional (3D) printing technology is widely used, security issues have arisen, especially in the terminal parts of automobiles, aircraft, and 3D-printed military equipment. If the original design models or the STL (stereolithography) files ar...
ver más
|
|
|
|
|
|
Ziyad R. Alashhab, Mohammed Anbar, Manmeet Mahinderjit Singh, Iznan H. Hasbullah, Prateek Jain and Taief Alaa Al-Amiedy
Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional com...
ver más
|
|
|
|
|
|
Wafae Hammouch, Chaymae Chouiekh, Ghizlane Khaissidi and Mostafa Mrabti
Crack is a condition indicator of the pavement?s structure. Generally, crack detection is an essential task for effective diagnosis of the road network. Moreover, evaluation of road quality is necessary to ensure traffic security. Since 2011, a periodic ...
ver más
|
|
|
|
|
|
Tyler Cultice and Himanshu Thapliyal
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems....
ver más
|
|
|
|
|
|
Jian Wang and Ying Li
Ensuring the security of IoT devices and chips at runtime has become an urgent task as they have been widely used in human life. Embedded memories are vital components of SoC (System on Chip) in these devices. If they are attacked or incur faults at runt...
ver más
|
|
|