过去一年中添加的文章,按日期排序
[PDF][PDF] Design and Implementation of IPsec VPN IoT Gateway System in National Secret Algorithm
Y Jiang, J Huang, Y Fan, X Zhu - … of Cyber Security …, 2024 - journals.riverpublishers.com
29 天前 - … subnets, meeting the requirements of applications in high… with the security
requirements of the Internet of Things (IoT… an IPSec VPN IoT security gateway based on domestic …
requirements of the Internet of Things (IoT… an IPSec VPN IoT security gateway based on domestic …
Leveraging Digital Twins and SIEM Integration for Incident Response in OT Environments
A Arias, C Arellano, U Zurutuza - … (JNIC)(9ª. 2024. Sevilla)(2024), pp. 294 …, 2024 - idus.us.es
29 天前 - … the identified requirements for the proposed platform. These requirements provide a
clear … The platform requirements have been determined based on the excellent adaptability …
clear … The platform requirements have been determined based on the excellent adaptability …
Online Learning and Model Pruning Against Concept Drifts in Edge Devices
29 天前 - … The proliferation of Internet of Things sensors has driven the adoption of the edge
computing … I/ADSs, which can be adopted also in devices with strict resource requirements. …
computing … I/ADSs, which can be adopted also in devices with strict resource requirements. …
Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds
Y Zhou, G Cheng, Z Ouyang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
30 天前 - Edge computing (EC) and container technology have been widely used to
increase the flexibility of computing resources and meet the real-time requirements for delay-…
increase the flexibility of computing resources and meet the real-time requirements for delay-…
Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic Keys
S Jain, AR Korenda, B Cambou, C Lucero - Science and Information …, 2024 - Springer
30 天前 - This paper outlines our primary objectives, which revolved around devising a robust
and lightweight solution for safeguarding industrial Internet of Things (IoT) device’s content. …
and lightweight solution for safeguarding industrial Internet of Things (IoT) device’s content. …
A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid
Y Wu, H Guo, Y Han, S Li, J Liu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
32 天前 - … is the most secure one which meets the requirements for SG functionality and
security. … control protocol for the smart grid systems,” IEEE Internet Things J., vol. 9, no. 9, pp. …
security. … control protocol for the smart grid systems,” IEEE Internet Things J., vol. 9, no. 9, pp. …
Reputation-Based Stable Blockchain Sharding Scheme for Smart Cities With IoT Consumer Electronics: A Deep Reinforcement Learning Approach
32 天前 - … used in security-enabled smart cities. However, considering high scalability
requirements from the IoT consumer electronics, this strategy may lead to higher security risks for a …
requirements from the IoT consumer electronics, this strategy may lead to higher security risks for a …
Accelerating Communication-efficient Federated Multi-Task Learning With Personalization and Fairness
32 天前 - Federated learning techniques provide a promising framework for collaboratively
training a machine learning model without sharing users' data, and delivering a security …
training a machine learning model without sharing users' data, and delivering a security …
[PDF][PDF] Software Architecture in Practice: Challenges and Opportunities in the Age of Digital Transformation: Literature Review
OM Albada, N Salman - researchgate.net
32 天前 - … Common software architecture tasks at software requirements, design, construction,
and testing were covered in our report. Phases of maintenance and the associated …
and testing were covered in our report. Phases of maintenance and the associated …
Secure by Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM)
J Marchang, J McDonald, S Keishing, K Zoughalian… - 2024 - preprints.org
32 天前 - … The proposed RTPM focuses on addressing the major security requirements for an
IoMT system: confidentiality, integrity, availability, conducts authentication, protect from DoS …
IoMT system: confidentiality, integrity, availability, conducts authentication, protect from DoS …