187   Artículos

 
en línea
Paniti Netinant, Thitipong Utsanok, Meennapa Rukhiran and Suttipong Klongdee    
With the rapid rise of digitalization in the global economy, home security systems have become increasingly important for personal comfort and property protection. The collaboration between humans, the Internet of Things (IoT), and smart homes can be hig... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Francisco Alonso, Benjamín Samaniego, Gonzalo Farias and Sebastián Dormido-Canto    
This article provides a general overview of the communication protocols used in the IEC61850 standard for the automation of electrical substations. Specifically, it examines the GOOSE and R-GOOSE protocols, which are used for exchanging various types of ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tao Feng, Taining Chen and Xiang Gong    
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analy... ver más
Revista: Information    Formato: Electrónico

 
en línea
Moutaz Alazab and Salah Alhyari    
Industry 4.0 has revolutionized manufacturing processes and facilities through the creation of smart and sustainable production facilities. Blockchain technology (BCT) has emerged as an invaluable asset within Industrial Revolution 4.0 (IR4.0), offering ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Georgios M. Nikolopoulos and Marc Fischlin    
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Spyridon Daousis, Nikolaos Peladarinos, Vasileios Cheimaras, Panagiotis Papageorgas, Dimitrios D. Piromalis and Radu Adrian Munteanu    
This paper highlights the crucial role of wireless sensor networks (WSNs) in the surveillance and administration of critical infrastructures (CIs), contributing to their reliability, security, and operational efficiency. It starts by detailing the intern... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam    
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ayman Khalil and Besma Zeddini    
The intersection of cybersecurity and opportunistic networks has ushered in a new era of innovation in the realm of wireless communications. In an increasingly interconnected world, where seamless data exchange is pivotal for both individual users and or... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo    
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Christian Esposito, Ross Horne, Livio Robaldo, Bart Buelens and Elfi Goesaert    
The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, se... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 12     Siguiente »