A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues
Security is a mandatory issue in any network, where sensitive data are transferred safely in
the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile …
the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile …
A Comparative Analysis for Harnessing Digital Twin Platforms for Net-Zero Manufacturing
A comprehensive review of digital twin platforms carried out through comparative study and
analysis of nearly (~ 100+ aprox) digital twins. It includes commercial and open-source …
analysis of nearly (~ 100+ aprox) digital twins. It includes commercial and open-source …
Scalable and Multi-Channel Real-Time Low Cost Monitoring System for PEM Electrolyzers Based on IoT Applications
AB Paredes-Baños, A Molina-Garcia, A Mateo-Aroca… - Electronics, 2024 - mdpi.com
This paper discusses and evaluates a novel multi-channel real-time architecture aimed at
monitoring a Proton Exchange Membrane (PEM) electrolyzer, both at the individual cell and …
monitoring a Proton Exchange Membrane (PEM) electrolyzer, both at the individual cell and …
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases
Proactive security plays a vital role in preventing the attack before entering active mode. In
the modern information environment, it depends on the vulnerability management …
the modern information environment, it depends on the vulnerability management …
Cybersecurity and data science
K Szczypiorski - Electronics, 2022 - mdpi.com
Towards the end of the Cold War in 1985, in reference to the theory of leadership for the first
time, in the book 'Leaders: The Strategies For Taking Charge'by Warren Bennis and Burt …
time, in the book 'Leaders: The Strategies For Taking Charge'by Warren Bennis and Burt …
Analysis of cyber-attacks for modern digital railway system using cyber range
G Sharma, E Sherif, M He… - 2022 IEEE Conference on …, 2022 - ieeexplore.ieee.org
The simulation of a modern railway system on the cyber range will investigate the supple
behavior of cyber-attacks in a modern digital railway system. The contemporary digital …
behavior of cyber-attacks in a modern digital railway system. The contemporary digital …
Study and analysis of threat assessment model and methodology in real-time informational environment
The threat assessment model and methodology are developed based on the study and
analysis of threat agents found in the real-time informational network. These models and …
analysis of threat agents found in the real-time informational network. These models and …
Designing Effective User Interfaces for Technology-based IPO Investment Platforms
SP Srivastava, S Srivastava… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
In the stock market, the two critical enablers aid in greater investment returns: a
shareholder's excellent business knowledge and a low purchase price. However, it is …
shareholder's excellent business knowledge and a low purchase price. However, it is …
Network Topology Based Identification and Analysis of Security Threats in Data Centres
Various physical and virtual devices are interconnected and mutually dependent on each
other in modern large-scale data centres. Security threats if analysed without considering …
other in modern large-scale data centres. Security threats if analysed without considering …
Check for Network Topology Based Identification and Analysis of Security Threats in Data Centres Jānis Kampars, Guntis Mosans (), and Jānis Grabis D Riga …
J Kampars - Digital Business and Intelligent Systems: 16th …, 2024 - books.google.com
Various physical and virtual devices are interconnected and mutually dependent on each
other in modern large-scale data centres. Security threats if analysed without considering …
other in modern large-scale data centres. Security threats if analysed without considering …