Securing wireless communication in critical infrastructure: challenges and opportunities
J Bodenhausen, C Sorgatz, T Vogt, K Grafflage… - … Conference on Mobile …, 2023 - Springer
Critical infrastructure constitutes the foundation of every society. While traditionally solely
relying on dedicated cable-based communication, this infrastructure rapidly transforms to …
relying on dedicated cable-based communication, this infrastructure rapidly transforms to …
Safeguarding the V2X Pathways: Exploring the Cybersecurity Landscape through Systematic Literature Review
Vehicle-to-Everything (V2X) communication, essential for enhancing road safety, driving
efficiency, and traffic management, must be robust against cybersecurity threats for …
efficiency, and traffic management, must be robust against cybersecurity threats for …
FPGA implementation of robust and low complexity template-based watermarking for digital images
K Dzhanashia, O Evsutin - Multimedia Tools and Applications, 2024 - Springer
Watermarking is a widespread technique for information protection and an invisible
alternative to quick response codes. The literature mainly considers software …
alternative to quick response codes. The literature mainly considers software …
Ensemble technique of intrusion detection for IoT-edge platform
Abstract Internet of Things (IoT) technology has revolutionized modern industrial sectors.
Moreover, IoT technology has been incorporated within several vital domains of …
Moreover, IoT technology has been incorporated within several vital domains of …
Adaptive PUF design to authenticate and evaluate heterogeneous IPs in edge computing
S Hemavathy, J Kokila… - The Journal of …, 2024 - Springer
Edge computing has become quintessential in commercial, healthcare, and industrial
applications. It enables real-time data processing at the edge device, thus reducing the data …
applications. It enables real-time data processing at the edge device, thus reducing the data …
Lightweight Secure Compression Scheme for Green IoT Applications
Abstract The Internet of Things (IoT) is a revolutionary paradigm that has gained significant
prominence in recent years. It represents the interconnection of everyday objects, devices …
prominence in recent years. It represents the interconnection of everyday objects, devices …
Virtual Power Plants Security Challenges, Solutions, and Emerging Trends: A Review
SP Rao, RS Tiruvalluru, SRA Balaji… - 2024 Cyber …, 2024 - ieeexplore.ieee.org
Virtual power plants (VPPs) are used to manage and integrate renewable energy resources
for better management and coordination. This integration, combined with modern …
for better management and coordination. This integration, combined with modern …
Challenges and Solutions in Integrating Narrowband IoT with Edge Computing: Resource Constraints, Security, Latency, and IDS Deployment
W Hendricks, B Kabaso - International Conference on Advanced …, 2023 - Springer
This study aimed to explore the integration of narrowband Internet of Things (NB-IoT) with
edge computing. The study examined existing literature regarding the resource constraints …
edge computing. The study examined existing literature regarding the resource constraints …
[引用][C] Convolutional Neural Networks based Transformer for Intrusion Detection in Edge-IoT
S Noureen - 2023 - Quaid I Azam University Islamabad