|
|
|
Iffat Gheyas, Gregory Epiphaniou, Carsten Maple and Subhash Lakshminarayana
The safe and efficient function of critical national infrastructure (CNI) relies on the accurate demand forecast. Cyber-physical system-based demand forecasting systems (CDFS), typically found in CNI (such as energy, water, and transport), are highly vul...
ver más
|
|
|
|
|
|
|
Deemah Tashman and Walaa Hamouda
In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be followi...
ver más
|
|
|
|
|
|
|
Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo and Antonella Santone
The Android platform is currently targeted by malicious writers, continuously focused on the development of new types of attacks to extract sensitive and private information from our mobile devices. In this landscape, one recent trend is represented by t...
ver más
|
|
|
|