21   Artículos

 
en línea
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici    
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Fahad M. Alotaibi and Vassilios G. Vassilakis    
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto     Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howe... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Iffat Gheyas, Gregory Epiphaniou, Carsten Maple and Subhash Lakshminarayana    
The safe and efficient function of critical national infrastructure (CNI) relies on the accurate demand forecast. Cyber-physical system-based demand forecasting systems (CDFS), typically found in CNI (such as energy, water, and transport), are highly vul... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muqing He, Deqing Zou, Weizhong Qiang, Shouhuai Xu, Wenbo Wu and Hai Jin    
In the context of life sciences, the rapid biotechnical development leads to the creation of huge amounts of biological data. The use of such data naturally brings concerns on human genetic privacy breaches, which also discourage biological data sharing.... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jesús Díaz-Verdejo, Javier Muñoz-Calle, Antonio Estepa Alonso, Rafael Estepa Alonso and Germán Madinabeitia    
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of security components of most organizations. They can find traces of known attacks in the network traffic or host events for which patterns or signatures have been... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dustin M. Mink, Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton and Samuel Russ    
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a da... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Kazuki Nakamura, Koji Hori and Shoichi Hirose    
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mike Nkongolo, Jacobus Philippus van Deventer and Sydney Mambwe Kasongo    
This research attempts to introduce the production methodology of an anomaly detection dataset using ten desirable requirements. Subsequently, the article presents the produced dataset named UGRansome, created with up-to-date and modern network traffic (... ver más
Revista: Information    Formato: Electrónico

 
en línea
Dean Ninian and Sam M. Dakka    
The design and development of morphing (shape shifting) aircraft wings?an innovative technology that has the potential to increase the aerodynamic efficiency and reduce noise signatures of aircrafts?was carried out. This research was focused on reducing ... ver más
Revista: Aerospace    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »