Results 131 to 140 of about 4,851,518 (333)

Security for IEEE P1451.1.6-based Sensor Networks for IoT Applications [PDF]

open access: yesarXiv
There are many challenges for Internet of Things (IoT) sensor networks including the lack of robust standards, diverse wireline and wireless connectivity, interoperability, security, and privacy. Addressing these challenges, the Institute of Electrical and Electronics Engineers (IEEE) P1451.0 standard defines network services, transducer services ...
arxiv  

CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing [PDF]

open access: yesarXiv, 2019
Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees ...
arxiv  

An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics

open access: yesIET Information Security
We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected.
Haiyan Xiu   +3 more
doaj   +1 more source

Enhancing Person Re-Identification through Attention-Driven Global Features and Angular Loss Optimization

open access: yesEntropy
To address challenges related to the inadequate representation and inaccurate discrimination of pedestrian attributes, we propose a novel method for person re-identification, which leverages global feature learning and classification optimization ...
Yihan Bi   +4 more
doaj   +1 more source

Development of an Outcomes-Based Undergraduate Curriculum in Homeland Security [PDF]

open access: yes, 2010
As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging.
Cutrer, Daniel A.   +2 more
core   +1 more source

A Study on Thermal Expansion and Thermomechanical Behavior of Composite Metal Foams

open access: yesAdvanced Engineering Materials, EarlyView.
The coefficient of thermal expansion of steel–steel composite metal foam (S‐S CMF) is shown to be lower than that of bulk stainless steel while its performance under compression demonstrate excellent mechanical stability and strength at all temperatures with gradualsoftening from 400 to 600 °C.
Zubin Chacko   +2 more
wiley   +1 more source

A Taxonomy of Functional Security Features and How They Can Be Located [PDF]

open access: yesarXiv
Security must be considered in almost every software system. Unfortunately, selecting and implementing security features remains challenging due to the variety of security threats and possible countermeasures. While security standards are intended to help developers, they are usually too abstract and vague to help implement security features, or they ...
arxiv  

Low‐Velocity Penetration Impact Behavior of Triply Periodic Minimal Surface Strut‐Based Lattices

open access: yesAdvanced Engineering Materials, EarlyView.
Triply periodic minimal surface (TPMS)‐based lattices are gaining attention for their multifunctional properties in applications as aeronautics and automotive, which involve low‐velocity impact loading. This work evaluates the low‐velocity penetration impact behavior of five distinct TPMS architectures.
Lucía Doyle   +2 more
wiley   +1 more source

Author Correction: Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Yifan Wang   +6 more
doaj   +1 more source

Fractographic Analysis and Fatigue Behavior of Additively Manufactured Ni‐Superalloy Components with Post Processing Heat Treatment and Hot Isostatic Pressing

open access: yesAdvanced Engineering Materials, EarlyView.
A study of mechanical properties and fractography of PBF‐LB/M‐built Inconel 718, performing heat treatments and hot‐isostatic pressing, is presented. Ultimate tensile strength and fatigue behavior are evaluated, examining differences in maximum load behavior, elongation, and regimes of fatigue.
David Sommer   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy