Results 11 to 20 of about 278,396 (266)
A survey on cyber security for smart grid communications [PDF]
A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core +3 more sources
European Cyber Security System [PDF]
Nowadays computer networks are widely spread in all spheres of human life. That is why the problem of cyber security of mankind is of great importance. Today, the European Union makes efforts to guarantee network safety in Europe by means of increase ...
Kolodiy, Yegor +2 more
core +2 more sources
A Two-Dimensional Key Vector Based Fast and Lightweight Block Cipher for Constrained Devices [PDF]
Gathering sensitive patient information is vital in healthcare for providing the proper therapy. The collected data must also be shared with the relevant parties in order to keep the environment open and honest.
Kakarla Shirisha +2 more
doaj +1 more source
The THREAT-ARREST Cyber-Security Training Platform [PDF]
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi +10 more
core +1 more source
A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence of smart airports. Services and systems powered by the IoT enable smart airports to have enhanced robustness, efficiency and control, governed by real-time ...
Nickolaos Koroniotis +4 more
doaj +1 more source
A Publicly Verifiable E-Voting System Based on Biometrics
Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transparency
Jinhui Liu +5 more
doaj +1 more source
AppChainer: investigating the chainability among payloads in android applications
Statistics show that more than 80 applications are installed on each android smartphone. Vulnerability research on Android applications is of critical importance.
Xiaobo Xiang +5 more
doaj +1 more source
Person Re-Identification Method Based on Dual Descriptor Feature Enhancement
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin +5 more
doaj +1 more source
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources
Anti-forensics techniques, particularly steganography and cryptography, have become increasingly pressing issues affecting current digital forensics practices. This paper advances the automation of hidden evidence extraction in audio files by proposing a
Mohamed Ghane +4 more
doaj +1 more source

