Results 131 to 140 of about 263,653 (212)
An AI-Based Integrated Multi-Sensor System with Edge Computing for the Adaptive Management of Human-Wildlife Conflict. [PDF]
Hajder M, Kolbusz J, Liput M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Module-OT: A Hardware Security Module for Operational Technology
2020 IEEE Texas Power and Energy Conference (TPEC), 2020Increased penetration levels of renewable energy and other types of distributed energy resources (DERs) on the modern electric grid-combined with technological advancements for electric system monitoring and control-introduce new cyberattack vectors and increase the cyberattack surface of energy systems. According to the IEEE Std.
William Hupp +3 more
openaire +2 more sources
Poor Man's Hardware Security Module (pmHSM)
Proceedings of the 9th Latin America Networking Conference, 2016The DNS Security Extensions (DNSSEC) add a new layer of security based on public-key infrastructure: each DNS record is digitally signed to verify the authenticity of the answer. However, the introduction of DNSSEC has an impact in the operational workflow of DNS systems: (i) signatures have an expiration date, hence the records must be periodically ...
Francisco Cifuentes +5 more
openaire +2 more sources
Automotive Security Solution Using Hardware Security Module (HSM)
SAE Technical Paper Series<div class="section abstract"><div class="htmlview paragraph">In today’s world, Vehicles are no longer mechanically dominated, with increased complexity, features and autonomous driving capabilities, vehicles are getting connected to internal and external environment e.g., V2I(Vehicle-to-Infrastructure), V2V(Vehicle-to-Vehicle), V2C(Vehicle-
Arvind Kumar +2 more
openaire +2 more sources
A Trusted IaaS Environment with Hardware Security Module
IEEE Transactions on Services Computing, 2016With the proliferation of cloud computing, security concerns about confidentiality violations of user data by the privileged domain and system administrators have been growing. This paper proposes secure cloud architecture with a hardware security module, which isolates cloud user data from potentially malicious privileged domains or cloud ...
Jinho Seol +4 more
openaire +2 more sources

