111   Artículos

 
en línea
Bing Su and Jiwu Liang    
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and sec... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Qasem Abu Al-Haija and Ahmed Al-Tamimi    
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin    
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan    
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shi-Yi Jin, Dong-Hyun Seo, Yeon-Jin Kim, Yong-Eun Kim, Samuel Woo and Jin-Gyun Chung    
To authenticate a controller area network (CAN) data frame, a message authentication code (MAC) must be sent along with the CAN frame, but there is no space reserved for the MAC in the CAN frame. Recently, difference-based compression (DBC) algorithms ha... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ayman Khalil and Besma Zeddini    
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and or... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Brent Pethers and Abubakar Bello    
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Saad Said Alqahtany, Ahmad B. Alkhodre, Abdulwahid Al Abdulwahid and Manar Alohaly    
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhead, ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ahmed A. Abdullah, B. M. El-den, Khaled M. Abo-Al-Ez and Tarek M. Hassan    
Advanced Metering Infrastructure (AMI) plays a crucial role in enabling the efficient functioning of Smart Electrical Grids, but its successful implementation hinges on robust cybersecurity measures. To uphold data confidentiality and integrity, the depl... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 7     Siguiente »