A study of synergy between programming practices evolution and information disclosure-causing vulnerabilities
G Varma - Iran Journal of Computer Science, 2024 - Springer
Abstract The Common Vulnerabilities and Exposures (CVE) is a formal dictionary of
vulnerabilities and associated weaknesses reported by the community. As programming …
vulnerabilities and associated weaknesses reported by the community. As programming …
IoT Communication Models and Modes of Connectivity
The IoT is a rapidly growing field that enables communication with various devices and
objects. It allows for the exchange of information within physical objects and virtual …
objects. It allows for the exchange of information within physical objects and virtual …
Blockchain-based group signature for secure authentication of IoT systems in smart home environments
M Kara, HRJ Merzeh, MA Aydin… - Cyber-Physical Systems, 2024 - Taylor & Francis
Current solutions that rely on a single-server architecture have privacy, anonymity, integrity,
and confidentiality limitations. Blockchain-based solutions can address some of these issues …
and confidentiality limitations. Blockchain-based solutions can address some of these issues …
Digital twin in power system research and development: Principle, scope, and challenges
MY Mohammed Abdelmotaleb, A Shrestha… - 2023 - openarchive.usn.no
In order to address the issues that arise in modern power systems, such as system
dynamics, stability, control, efficiency, reliability, economy, planning and policy, and so on …
dynamics, stability, control, efficiency, reliability, economy, planning and policy, and so on …
Investigating the Effectiveness of Internet Key Exchange (IKE) Protocol in Wireless Network Security
D Mondal, N Thangarasu, YS Ingle… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
The Internet Key alternate (IKE) protocol is a widely used safety protocol for organizing
comfy tunnels and encrypting visitors in wireless networks. The protocol is designed to …
comfy tunnels and encrypting visitors in wireless networks. The protocol is designed to …
[HTML][HTML] Litteraturstudie om informations-och cybersäkerhetsutmaningar inom jordbrukssektorn: Informations-och cybersäkerhetsutmaningar inom jordbrukssektorn …
J de la Rosée - 2024 - diva-portal.org
Forskningsfrågan som drev denna studie var att identifiera och analysera olika risker och hot
relaterade till informations-och cybersäkerhet inom digitaliserade jordbruk. Genom en …
relaterade till informations-och cybersäkerhet inom digitaliserade jordbruk. Genom en …
A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments
UP Rao, P Choksy, A Chaurasia - … on Security, Privacy and Data Analytics, 2022 - Springer
Access control is one of the most basic information security requirements, which prevents
unauthorized people from accessing the system or facilities. The access control process …
unauthorized people from accessing the system or facilities. The access control process …
Orr-Cp-Abe: A Secure and Efficient Outsourced Attribute-Based Encryption Scheme with Decryption Results Reuse
Y Tao, Y Zhu, C Ge, L Zhou, S Zhou, J Liu… - Available at SSRN … - papers.ssrn.com
Attribute-based encryption that supports computation outsourcing has been a promising
approach to implement fine-grained access control in the Internet of Things (IoT). However …
approach to implement fine-grained access control in the Internet of Things (IoT). However …
АКТУАЛЬНЫЕ ПРОБЛЕМЫ ИНФОТЕЛЕКОММУНИКАЦИЙ В НАУКЕ И ОБРАЗОВАНИИ
ВА ДЕСНИЦКИЙ, ИВ КОТЕНКО, ДС ЛЕВШУН… - elibrary.ru
Появление интеллектуальных (умных) систем, основанных на применении методов
искусственного интеллекта, обусловливает необходимость получения новых и …
искусственного интеллекта, обусловливает необходимость получения новых и …