Results 51 to 60 of about 101,280 (178)
Internet of Things (IoT) systems increasingly rely on lightweight protocols such as the Constrained Application Protocol (CoAP), which are designed for resource-constrained devices but open new avenues for protocol-level attacks.
Jose Aveleira-Mata +5 more
doaj +1 more source
Mobile support in CSCW applications and groupware development frameworks
Computer Supported Cooperative Work (CSCW) is an established subset of the field of Human Computer Interaction that deals with the how people use computing technology to enhance group interaction and collaboration.
Johnson, D
core +1 more source
Old Wine in New Skins? Revisiting the Software Architecture for IP Network Stacks on Constrained IoT Devices [PDF]
In this paper, we argue that existing concepts for the design and implementation of network stacks for constrained devices do not comply with the requirements of current and upcoming Internet of Things (IoT) use cases.
Baccelli, Emmanuel +4 more
core +4 more sources
Towards a Secure Smart Grid Storage Communications Gateway
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core +1 more source
Simulation of undular bores evolution with damping [PDF]
Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent ...
Chiew, K.L. +3 more
core +3 more sources
Options for Securing RTP Sessions [PDF]
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core +2 more sources
More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the
Barroso, Luiz André +14 more
core +1 more source
Model-based testing of Internet Mail Protocols
The paper discusses model-based testing of the modern Internet e-mail protocols, including the method of protocol modeling by means of formal notations, peculiarities of e-mail protocols in the context of testing.
N. V. Pakulin, A. N. Tugaenko
doaj
Background The Global Adult Tobacco Survey (GATS), a nationally representative household survey launched in 2007, could benefit from a cost-effective and easy to use platform that included support for multiple-languages, the ability to field surveys in ...
Edward Rainey +5 more
doaj +1 more source
RPKI Defense Capability Simulation Method Based on Container Virtualization
As the main inter-domain routing protocol in today’s internet, the Border Gateway Protocol (BGP) faces serious security risks during actual usage. Research on BGP malicious attack methods requires a realistic network environment, and evaluation methods ...
Bo Yu, Xingyuan Liu, Xiaofeng Wang
doaj +1 more source

