|
|
|
Mizuki Asano, Takumi Miyoshi and Taku Yamazaki
Smart home environments, which consist of various Internet of Things (IoT) devices to support and improve our daily lives, are expected to be widely adopted in the near future. Owing to a lack of awareness regarding the risks associated with IoT devices ...
ver más
|
|
|
|
|
|
|
Yufeng Li, Mengxiao Liu, Chenhong Cao and Jiangtao Li
Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it is essential to mine their vulnerabilities and corresponding exploitation methods. However, mi...
ver más
|
|
|
|
|
|
|
Silvano Cortesi, Christian Vogt and Michele Magno
IPS is a crucial technology that enables medical staff and hospital management to accurately locate and track persons or assets inside medical buildings. Among other technologies, readily available BLE can be exploited to achieve an energy-efficient and ...
ver más
|
|
|
|
|
|
|
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule and Cosmas Ifeanyi Nwakanma
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ...
ver más
|
|
|
|
|
|
|
Khai-Minh Ma, Duc-Hung Le, Cong-Kha Pham and Trong-Thuc Hoang
The security of Internet of Things (IoTs) devices in recent years has created interest in developing implementations of lightweight cryptographic algorithms for such systems. Additionally, open-source hardware and field-programable gate arrays (FPGAs) ar...
ver más
|
|
|
|
|
|
|
Alfredo Liverani, Antonio Bacciaglia, Eugenio Nisini and Alessandro Ceruti
Industrial engineering applications often require manufacturing large components in composite materials to obtain light structures; however, moulds are expensive, especially when manufacturing a limited batch of parts. On the one hand, when traditional a...
ver más
|
|
|
|
|
|
|
Antonio Francesco Gentile, Davide Macrì, Floriano De Rango, Mauro Tropea and Emilio Greco
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve this goal, also b...
ver más
|
|
|
|
|
|
|
Chen Liang, Bo Yu, Wei Xie, Baosheng Wang and Wei Peng
A large number of IoT devices access the Internet. While enriching our lives, IoT devices bring potential security risks. Device identification is one effective way to mitigate security risks and manage IoT assets. Typical identification algorithms gener...
ver más
|
|
|
|
|
|
|
Noon Hussein and Armstrong Nhlabatsi
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT de...
ver más
|
|
|
|
|
|
|
Jean Rabault, Takehiko Nose, Gaute Hope, Malte Müller, Øyvind Breivik, Joey Voermans, Lars Robert Hole, Patrik Bohlinger, Takuji Waseda, Tsubasa Kodaira, Tomotaka Katsuno, Mark Johnson, Graig Sutherland, Malin Johansson, Kai Haakon Christensen, Adam Garbo, Atle Jensen, Olav Gundersen, Aleksey Marchenko and Alexander Babanin
There is a wide consensus within the polar science, meteorology, and oceanography communities that more in situ observations of the ocean, atmosphere, and sea ice are required to further improve operational forecasting model skills. Traditionally, the vo...
ver más
|
|
|
|