|
|
|
Yusheng Chen, Zhaofa Sun, Yanmei Wang, Ye Ma and Weili Yang
In the context of global food security and the pursuit of sustainable agricultural development, fostering synergistic innovation in the seed industry is of strategic importance. However, the collaborative innovation process between seed companies, resear...
ver más
|
|
|
|
|
|
|
Fatemeh Stodt and Christoph Reich
Industrial Internet of Things (IIoT) systems are enhancing the delivery of services and boosting productivity in a wide array of industries, from manufacturing to healthcare. However, IIoT devices are susceptible to cyber-threats such as the leaking of i...
ver más
|
|
|
|
|
|
|
Hongli Zhang and Ying Li
Computation-intensive vehicle tasks sharply increase with the rapid growth of intelligent vehicles. The technology of Mobile Edge Computing (MEC) has the possibility of assisting vehicles with computation offloading. To solve the problem of computation r...
ver más
|
|
|
|
|
|
|
Yuhang Zhang and Ming Ni
With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS). Due to the extensive application of information and communication technology, C...
ver más
|
|
|
|
|
|
|
N?guessan Yves-Roland Douha, Masahiro Sasabe, Yuzo Taenaka and Youki Kadobayashi
In the digital era, smart-home users face growing threats from cyberattacks that threaten their privacy and security. Hence, it is essential for smart-home users to prioritize cybersecurity education and training to secure their homes. Despite this, the ...
ver más
|
|
|
|
|
|
|
Burhan Ul Islam Khan, Farhat Anwar, Farah Diyana Bt. Abdul Rahman, Rashidah Funke Olanrewaju, Khang Wen Goh, Zuriati Janin and Md Arafatur Rahman
This paper introduces a computational strategic game model capable of mitigating the adversarial impact of node misbehaviour in large-scale Internet of Things (IoT) deployments. This security model?s central concept is to preclude the participation of mi...
ver más
|
|
|
|
|
|
|
Razvan Florea and Mitica Craus
Cybersecurity plays an increasing role in today?s digital space, and its methods must keep pace with the changes. Both public and private sector researchers have put efforts into strengthening the security of networks by proposing new approaches. This pa...
ver más
|
|
|
|
|
|
|
Zhijun Wu, Ruochen Dong and Peng Wang
For the air traffic management cyber physical system, if an attacker successfully obtains authority or data through a cyber attack, combined with physical attacks, it will cause serious consequences. Game theory can be applied to the strategic interactio...
ver más
|
|
|
|
|
|
|
Olga R. Laponina,Vasily A. Matoshenko
Pág. 31 - 44
The article discusses the procedure for introducing game mechanisms into the educational process. The main elements of gamification, the concept of the game element "Capture the flag" ("CaptureTheFlag" - CTF) are described, the basic principles of the ar...
ver más
|
|
|
|
|
|
|
Ruoyu Feng, Shengming Jiang and Zhichao Zheng
Many incentive schemes address the selfishness issue in opportunistic networks and show performance improvement by simulations. However, the insights of incentive schemes that affect network performance are not clear. Network capacity analysis can reveal...
ver más
|
|
|
|