Results 1 to 10 of about 232,020 (288)
Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures [PDF]
Critical Infrastructures (CIs) are sensible targets. They could be physically damaged by natural or human actions, causing service disruptions, economic losses, and, in some extreme cases, harm to people.
Alessandro Fausto +4 more
doaj +2 more sources
What Physical Layer Security Can Do for 6G Security [PDF]
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance.
Miroslav Mitev +3 more
doaj +2 more sources
The Right to Provide for the Child and Relating Methodology in the Convention on the Rights of the Child and Iran's legal system [PDF]
Children's rights have been taken into account from different aspects, esp. in consequent of establishment of the Convention on the Rights of the Child.
Saeid Mahjoub
doaj +1 more source
In the context of the Internet of Things (IoT), location-based applications have introduced new challenges in terms of location spoofing. With an open and shared wireless medium, a malicious spoofer can impersonate active devices, gain access to the ...
Waleed Aldosari
doaj +1 more source
Security and privacy issues with IoT edge devices hinder the application of IoT technology in many applications. Applying cryptographic protocols to edge devices is the perfect solution to security issues.
Atef Ibrahim +5 more
doaj +1 more source
The Use Virtual Reality to Assist In The Preparation Of An Ergonomic Analysis Of Nuclear Facilities
Ergonomic Analysis consists of making value judgments about the global performance of certain man-machine or man-task systems and may result from a demand related to conditions and/or safety at work.
Daniel Mol Machado +4 more
doaj +1 more source
Nano-Photonic Metrics: Fundamentals and Experimental Demonstration
As the popularity of Internet of Things (IoT) increases, there is a considerable demand for the improvement of physical security, owing to the increase in edge devices.
Takuro Ohteki +2 more
doaj +1 more source
In this work we explore the use of blockchain with Internet of Things (IoT) devices to provide visitor authentication and access control in a physical environment.
Frederick Stock +3 more
doaj +1 more source
Information security analysis on physical security in university x using maturity model
The threat of physical security can be from human factors, natural disasters, and information technology itself. Therefore, to prevent threats, we need the right tools to control current activities, evaluate potential impacts, and make appropriate plans ...
Khairunnisak Nur Isnaini +1 more
doaj +1 more source
Due to the diverse and mobile nature of the deployment environment, smart commodity devices are vulnerable to various spoofing attacks which can allow a rogue device to get access to a large network. The vulnerability of the traditional digital signature-
Md Faizul Bari +3 more
doaj +1 more source

