|
|
|
Ted H. Szymanski
The next-generation ?Industrial Internet of Things? (IIoT) will support ?Machine-to-Machine? (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-securi...
ver más
|
|
|
|
|
|
|
Dominik Heimsch, Moritz Speckmaier, Daniel Gierszewski, Florian Schwaiger, Zoe Mbikayi and Florian Holzapfel
This paper presents a mission data-handling algorithm that provides a data link interface between a flight control computer (FCC) and a ground control station (GCS) using the protocol standard STANAG 4586, AEP-84 Volume II. A subset of defined messages i...
ver más
|
|
|
|
|
|
|
Alex Galis
This paper presents a comprehensive set of design methods for making future Internet networking fully energy-aware and sustainably minimizing and managing the energy footprint. It includes (a) 41 energy-aware design methods, grouped into Service Operatio...
ver más
|
|
|
|
|
|
|
Huiting Wang, Yazhi Liu, Wei Li and Zhigang Yang
In data center networks, when facing challenges such as traffic volatility, low resource utilization, and the difficulty of a single traffic scheduling strategy to meet demands, it is necessary to introduce intelligent traffic scheduling mechanisms to im...
ver más
|
|
|
|
|
|
|
Azizah Assiri and Hassen Sallay
Opportunistic mobile social networks (OMSNs) have become increasingly popular in recent years due to the rise of social media and smartphones. However, message forwarding and sharing social information through intermediary nodes on OMSNs raises privacy c...
ver más
|
|
|
|
|
|
|
Weizhen Guo, Min Zhu, Bo Yang, Yanbo Wu and Xinguo Li
Underwater wireless sensor networks (UWSNs) are significantly different from terrestrial sensor networks in the following aspects: low bandwidth, high latency, variable topology, limited battery, low processing power and so on. These new features pose ma...
ver más
|
|
|
|
|
|
|
Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo and Mohamed Shehab
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwardi...
ver más
|
|
|
|
|
|
|
Hongyu Liu, Hong Ni and Rui Han
The control of transmission rates is currently a major topic in network research, as it plays a significant role in determining network performance. Traditional network design principles suggest that network nodes should only be responsible for forwardin...
ver más
|
|
|
|
|
|
|
MariaCarmen de Toro, Carlos Borrego and Sergi Robles
Opportunistic networks (OppNets) leverage opportunistic contacts to flow data across an infrastructure-free network. As of yet, OppNets? performance depends on applying the most suitable forwarding strategy based on the OppNet typology. On the other hand...
ver más
|
|
|
|
|
|
|
Jing Wang and Tao Feng
The SCADA system, which is widely used in the continuous monitoring and control of the physical process of modern critical infrastructure, relies on the feedback control loop. The remote state estimation system triggers the control algorithm or control c...
ver más
|
|
|
|