Results 1 to 10 of about 232,020 (288)

Toward the Integration of Cyber and Physical Security Monitoring Systems for Critical Infrastructures [PDF]

open access: yesSensors, 2021
Critical Infrastructures (CIs) are sensible targets. They could be physically damaged by natural or human actions, causing service disruptions, economic losses, and, in some extreme cases, harm to people.
Alessandro Fausto   +4 more
doaj   +2 more sources

What Physical Layer Security Can Do for 6G Security [PDF]

open access: goldIEEE Open Journal of Vehicular Technology, 2023
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance.
Miroslav Mitev   +3 more
doaj   +2 more sources

The Right to Provide for the Child and Relating Methodology in the Convention on the Rights of the Child and Iran's legal system [PDF]

open access: yesفلسفه حقوق, 2023
Children's rights have been taken into account from different aspects, esp. in consequent of establishment of the Convention on the Rights of the Child.
Saeid Mahjoub
doaj   +1 more source

Deep Learning-Based Location Spoofing Attack Detection and Time-of-Arrival Estimation through Power Received in IoT Networks

open access: yesSensors, 2023
In the context of the Internet of Things (IoT), location-based applications have introduced new challenges in terms of location spoofing. With an open and shared wireless medium, a malicious spoofer can impersonate active devices, gain access to the ...
Waleed Aldosari
doaj   +1 more source

Low-Space Bit-Parallel Systolic Structure for AOP-Based Multiplier Suitable for Resource-Constrained IoT Edge Devices

open access: yesMathematics, 2022
Security and privacy issues with IoT edge devices hinder the application of IoT technology in many applications. Applying cryptographic protocols to edge devices is the perfect solution to security issues.
Atef Ibrahim   +5 more
doaj   +1 more source

The Use Virtual Reality to Assist In The Preparation Of An Ergonomic Analysis Of Nuclear Facilities

open access: yesBrazilian Journal of Radiation Sciences, 2023
Ergonomic Analysis consists of making value judgments about the global performance of certain man-machine or man-task systems and may result from a demand related to conditions and/or safety at work.
Daniel Mol Machado   +4 more
doaj   +1 more source

Nano-Photonic Metrics: Fundamentals and Experimental Demonstration

open access: yesPhotonics, 2022
As the popularity of Internet of Things (IoT) increases, there is a considerable demand for the improvement of physical security, owing to the increase in edge devices.
Takuro Ohteki   +2 more
doaj   +1 more source

Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things

open access: yesCryptography, 2022
In this work we explore the use of blockchain with Internet of Things (IoT) devices to provide visitor authentication and access control in a physical environment.
Frederick Stock   +3 more
doaj   +1 more source

Information security analysis on physical security in university x using maturity model

open access: yesJurnal Informatika, 2020
The threat of physical security can be from human factors, natural disasters, and information technology itself. Therefore, to prevent threats, we need the right tools to control current activities, evaluate potential impacts, and make appropriate plans ...
Khairunnisak Nur Isnaini   +1 more
doaj   +1 more source

Statistical Analysis Based Feature Selection Enhanced RF-PUF With >99.8% Accuracy on Unmodified Commodity Transmitters for IoT Physical Security

open access: yesFrontiers in Electronics, 2022
Due to the diverse and mobile nature of the deployment environment, smart commodity devices are vulnerable to various spoofing attacks which can allow a rogue device to get access to a large network. The vulnerability of the traditional digital signature-
Md Faizul Bari    +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy