Results 51 to 60 of about 101,280 (178)

CoAP_UAD: CoAP under attack dataset — A comprehensive dataset for CoAP-based IoT security researchfigshare

open access: yesData in Brief
Internet of Things (IoT) systems increasingly rely on lightweight protocols such as the Constrained Application Protocol (CoAP), which are designed for resource-constrained devices but open new avenues for protocol-level attacks.
Jose Aveleira-Mata   +5 more
doaj   +1 more source

Mobile support in CSCW applications and groupware development frameworks

open access: yes, 2013
Computer Supported Cooperative Work (CSCW) is an established subset of the field of Human Computer Interaction that deals with the how people use computing technology to enhance group interaction and collaboration.
Johnson, D
core   +1 more source

Old Wine in New Skins? Revisiting the Software Architecture for IP Network Stacks on Constrained IoT Devices [PDF]

open access: yes, 2015
In this paper, we argue that existing concepts for the design and implementation of network stacks for constrained devices do not comply with the requirements of current and upcoming Internet of Things (IoT) use cases.
Baccelli, Emmanuel   +4 more
core   +4 more sources

Towards a Secure Smart Grid Storage Communications Gateway

open access: yes, 2017
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core   +1 more source

Simulation of undular bores evolution with damping [PDF]

open access: yes, 2017
Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent ...
Chiew, K.L.   +3 more
core   +3 more sources

Options for Securing RTP Sessions [PDF]

open access: yes, 2014
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core   +2 more sources

Internet Predictions [PDF]

open access: yes, 2010
More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the
Barroso, Luiz André   +14 more
core   +1 more source

Model-based testing of Internet Mail Protocols

open access: yesТруды Института системного программирования РАН, 2018
The paper discusses model-based testing of the modern Internet e-mail protocols, including the method of protocol modeling by means of formal notations, peculiarities of e-mail protocols in the context of testing.
N. V. Pakulin, A. N. Tugaenko
doaj  

Tobacco surveillance through electronic data collection on the Android operating system - evidence from the Global Adult Tobacco Survey

open access: yesTobacco Induced Diseases, 2018
Background The Global Adult Tobacco Survey (GATS), a nationally representative household survey launched in 2007, could benefit from a cost-effective and easy to use platform that included support for multiple-languages, the ability to field surveys in ...
Edward Rainey   +5 more
doaj   +1 more source

RPKI Defense Capability Simulation Method Based on Container Virtualization

open access: yesApplied Sciences
As the main inter-domain routing protocol in today’s internet, the Border Gateway Protocol (BGP) faces serious security risks during actual usage. Research on BGP malicious attack methods requires a realistic network environment, and evaluation methods ...
Bo Yu, Xingyuan Liu, Xiaofeng Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy