|
|
|
Tharsila Maynardes Dallabona Fariniuk, Rodrigo José Firmino, Andrés Luque-Ayala
|
|
|
|
|
|
|
Natalia Sánchez-Patiño, Gina Gallegos-Garcia and Mario E. Rivero-Angeles
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, thi...
ver más
|
|
|
|
|
|
|
Firas Najjar, Qusay Bsoul and Hasan Al-Refai
Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices on t...
ver más
|
|
|
|
|
|
|
Ahmad Reda Alzighaibi
Currently, the primary concerns on the Internet are security and privacy, particularly in encrypted communications to prevent snooping and modification of Domain Name System (DNS) data by hackers who may attack using the HTTP protocol to gain illegal acc...
ver más
|
|
|
|
|
|
|
Cheng-Jian Lin, Min-Su Huang and Chin-Ling Lee
The applications of computer networks are increasingly extensive, and networks can be remotely controlled and monitored. Cyber hackers can exploit vulnerabilities and steal crucial data or conduct remote surveillance through malicious programs. The frequ...
ver más
|
|
|
|
|
|
|
Fazal Raheman, Tejas Bhagat, Brecht Vermeulen and Peter Van Daele
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a ?necessary evil?. Third-party permissions resulting in an attack surface (AS) and in-computer st...
ver más
|
|
|
|
|
|
|
Nadera Sultana Tany, Sunish Suresh, Durgesh Nandan Sinha, Chinmay Shinde, Cristina Stolojescu-Crisan and Rahamatullah Khondoker
Modern autonomous vehicles with an electric/electronic (E/E) architecture represent the next big step in the automation and evolution of smart and self-driving vehicles. This technology is of significant interest nowadays and humans are currently witness...
ver más
|
|
|
|
|
|
|
Louis Shekhtman and Erez Waisbard
A reliable log system is a prerequisite for many applications. Financial systems need to have transactions logged in a precise manner, medical systems rely on having trusted medical records and security logs record system access requests in order to trac...
ver más
|
|
|
|
|
|
|
Xiaolong Wang, Haowen Yan and Liming Zhang
Encryption of vector maps, used for copyright protection, is of importance in the community of geographic information sciences. However, some studies adopt one-to-one mapping to scramble vertices and permutate the coordinates one by one according to the ...
ver más
|
|
|
|
|
|
|
Pablo López-Silva, Dr., Raúl Madrid, Dr.
Pág. 53 - 76
Los actuales avances en el campo de las neurotecnologías prometen revolucionar el tratamiento de muchas condiciones médicas. Sin embargo, para algunos, tales avances podrían exacerbar la inequidad social y ofrecer a corporaciones, hackers y Gobiernos int...
ver más
|
|
|
|