232   Artículos

 
en línea
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam    
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Woo-Hyun Choi and Jung-Ho Lewe    
This study proposes a deep learning model utilizing the BACnet (Building Automation and Control Network) protocol for the real-time detection of mechanical faults and security vulnerabilities in building automation systems. Integrating various machine le... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Filippo Dolente, Rosario Giuseppe Garroppo and Michele Pagano    
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core ne... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Håkon Harnes and Donn Morrison    
WebAssembly is a low-level bytecode language that enables high-level languages like C, C++, and Rust to be executed in the browser at near-native performance. In recent years, WebAssembly has gained widespread adoption and is now natively supported by al... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani and Samad Rostampour    
A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smar... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari    
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tao Feng, Taining Chen and Xiang Gong    
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analy... ver más
Revista: Information    Formato: Electrónico

 
en línea
Carlos Blanco, Antonio Santos-Olmo and Luis Enrique Sánchez    
As the Internet of Things (IoT) becomes more integral across diverse sectors, including healthcare, energy provision and industrial automation, the exposure to cyber vulnerabilities and potential attacks increases accordingly. Facing these challenges, th... ver más
Revista: Information    Formato: Electrónico

 
en línea
Gursu Gurer, Yaser Dalveren, Ali Kara and Mohammad Derawi    
The automatic dependent surveillance broadcast (ADS-B) system is one of the key components of the next generation air transportation system (NextGen). ADS-B messages are transmitted in unencrypted plain text. This, however, causes significant security vu... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed    
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 15     Siguiente »