A study of synergy between programming practices evolution and information disclosure-causing vulnerabilities

G Varma - Iran Journal of Computer Science, 2024 - Springer
Abstract The Common Vulnerabilities and Exposures (CVE) is a formal dictionary of
vulnerabilities and associated weaknesses reported by the community. As programming …

IoT Communication Models and Modes of Connectivity

A Prasad, P Kapoor, TP Singh - … and Security Challenges in IoT: Present …, 2024 - Springer
The IoT is a rapidly growing field that enables communication with various devices and
objects. It allows for the exchange of information within physical objects and virtual …

Blockchain-based group signature for secure authentication of IoT systems in smart home environments

M Kara, HRJ Merzeh, MA Aydin… - Cyber-Physical Systems, 2024 - Taylor & Francis
Current solutions that rely on a single-server architecture have privacy, anonymity, integrity,
and confidentiality limitations. Blockchain-based solutions can address some of these issues …

Digital twin in power system research and development: Principle, scope, and challenges

MY Mohammed Abdelmotaleb, A Shrestha… - 2023 - openarchive.usn.no
In order to address the issues that arise in modern power systems, such as system
dynamics, stability, control, efficiency, reliability, economy, planning and policy, and so on …

Investigating the Effectiveness of Internet Key Exchange (IKE) Protocol in Wireless Network Security

D Mondal, N Thangarasu, YS Ingle… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
The Internet Key alternate (IKE) protocol is a widely used safety protocol for organizing
comfy tunnels and encrypting visitors in wireless networks. The protocol is designed to …

[HTML][HTML] Litteraturstudie om informations-och cybersäkerhetsutmaningar inom jordbrukssektorn: Informations-och cybersäkerhetsutmaningar inom jordbrukssektorn …

J de la Rosée - 2024 - diva-portal.org
Forskningsfrågan som drev denna studie var att identifiera och analysera olika risker och hot
relaterade till informations-och cybersäkerhet inom digitaliserade jordbruk. Genom en …

A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments

UP Rao, P Choksy, A Chaurasia - … on Security, Privacy and Data Analytics, 2022 - Springer
Access control is one of the most basic information security requirements, which prevents
unauthorized people from accessing the system or facilities. The access control process …

Orr-Cp-Abe: A Secure and Efficient Outsourced Attribute-Based Encryption Scheme with Decryption Results Reuse

Y Tao, Y Zhu, C Ge, L Zhou, S Zhou, J Liu… - Available at SSRN … - papers.ssrn.com
Attribute-based encryption that supports computation outsourcing has been a promising
approach to implement fine-grained access control in the Internet of Things (IoT). However …

АКТУАЛЬНЫЕ ПРОБЛЕМЫ ИНФОТЕЛЕКОММУНИКАЦИЙ В НАУКЕ И ОБРАЗОВАНИИ

ВА ДЕСНИЦКИЙ, ИВ КОТЕНКО, ДС ЛЕВШУН… - elibrary.ru
Появление интеллектуальных (умных) систем, основанных на применении методов
искусственного интеллекта, обусловливает необходимость получения новых и …

[引用][C] ANALYSIS OF ATTACK ZONES ON IOT AND ITS ELEMENTS, RESEARCH VULNERABILITIES AND OFFERING OF PROBLEM-SOLVING SOLUTIONS