Results 41 to 50 of about 162,443 (304)

Fast Polar Decoding With Successive Cancellation List Creeper Algorithm

open access: yesIEEE Access
Polar codes have emerged as a focal point in the field of error-correcting codes, owing to their remarkable capacity-achieving characteristics and their relevance in various modern communication systems. The basic successive cancellation (SC) approach is
Ilya Timokhin, Fedor Ivanov
doaj   +1 more source

Dual Rate Control for Security in Cyber-physical Systems

open access: yes, 2015
We consider malicious attacks on actuators and sensors of a feedback system which can be modeled as additive, possibly unbounded, disturbances at the digital (cyber) part of the feedback loop.
Hirzallah, Nabil   +2 more
core   +1 more source

Decision tree-based detection of denial of service and command injection attacks on robotic vehicles [PDF]

open access: yes, 2015
Mobile cyber-physical systems, such as automobiles, drones and robotic vehicles, are gradually becoming attractive targets for cyber attacks. This is a challenge because intrusion detection systems built for conventional computer systems tend to be ...
Bezemskij, Anatolij   +3 more
core   +2 more sources

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities

open access: yes, 2017
Smart cities must integrate a number of interdependent cyber-physical systems that operate in a coordinated manner to improve the well-being of the city's residents. A cyber-physical system (CPS) is a system of computational elements controlling physical
Ferdowsi, Aidin   +3 more
core   +1 more source

Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels

open access: yesAdvanced Optical Materials, EarlyView.
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam   +6 more
wiley   +1 more source

Smart Grid Security: Threats, Challenges, and Solutions [PDF]

open access: yes, 2016
The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points.
Biswas, Saroj   +4 more
core   +2 more sources

Wireless and Physical Security via Embedded Sensor Networks [PDF]

open access: yes, 2008
Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the ...
Bestavros, Azer, Ocean, Michael J.
core   +2 more sources

Flexible Sensor‐Based Human–Machine Interfaces with AI Integration for Medical Robotics

open access: yesAdvanced Robotics Research, EarlyView.
This review explores how flexible sensing technology and artificial intelligence (AI) significantly enhance human–machine interfaces in medical robotics. It highlights key sensing mechanisms, AI‐driven advancements, and applications in prosthetics, exoskeletons, and surgical robotics.
Yuxiao Wang   +5 more
wiley   +1 more source

Cyber–Physical Security Assessment for Maritime Vessels: Study on Drillship DP System Using American Petroleum Institute Security Risk Analysis and Bow-Tie Analysis

open access: yesJournal of Marine Science and Engineering
The maritime industry’s increasing integration of IT/OT systems into vessel operations has significantly elevated its exposure to cyber–physical threats, making the development of effective cyber risk management strategies a necessity.
Iosif Progoulakis   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy