Results 11 to 20 of about 278,396 (266)

A survey on cyber security for smart grid communications [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2012
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core   +3 more sources

European Cyber Security System [PDF]

open access: yes, 2017
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem of cyber security of mankind is of great importance. Today, the European Union makes efforts to guarantee network safety in Europe by means of increase ...
Kolodiy, Yegor   +2 more
core   +2 more sources

A Two-Dimensional Key Vector Based Fast and Lightweight Block Cipher for Constrained Devices [PDF]

open access: yesITM Web of Conferences
Gathering sensitive patient information is vital in healthcare for providing the proper therapy. The collected data must also be shared with the relevant parties in order to keep the environment open and honest.
Kakarla Shirisha   +2 more
doaj   +1 more source

The THREAT-ARREST Cyber-Security Training Platform [PDF]

open access: yes, 2020
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi   +10 more
core   +1 more source

A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports

open access: yesIEEE Access, 2020
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence of smart airports. Services and systems powered by the IoT enable smart airports to have enhanced robustness, efficiency and control, governed by real-time ...
Nickolaos Koroniotis   +4 more
doaj   +1 more source

A Publicly Verifiable E-Voting System Based on Biometrics

open access: yesCryptography, 2023
Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transparency
Jinhui Liu   +5 more
doaj   +1 more source

AppChainer: investigating the chainability among payloads in android applications

open access: yesCybersecurity, 2023
Statistics show that more than 80 applications are installed on each android smartphone. Vulnerability research on Android applications is of critical importance.
Xiaobo Xiang   +5 more
doaj   +1 more source

Person Re-Identification Method Based on Dual Descriptor Feature Enhancement

open access: yesEntropy, 2023
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin   +5 more
doaj   +1 more source

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +3 more sources

A Novel Hybrid Method for Effective Identification and Extraction of Digital Evidence Masked by Steganographic Techniques in WAV and MP3 Files

open access: yesJournal of Information Security and Cybercrimes Research, 2023
Anti-forensics techniques, particularly steganography and cryptography, have become increasingly pressing issues affecting current digital forensics practices. This paper advances the automation of hidden evidence extraction in audio files by proposing a
Mohamed Ghane   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy