Results 51 to 60 of about 2,352,522 (144)

Formal Template-Based Generation of Attack–Defence Trees for Automated Security Analysis

open access: yesInformation, 2023
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS) are becoming increasingly complex, but demonstrating the security of CPS is hard and security is frequently compromised.
Jeremy Bryans   +4 more
doaj   +1 more source

Integrating security and usability into the requirements and design process [PDF]

open access: yes, 2006
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core   +1 more source

Semantic Clustering and Transfer Learning in Social Media Texts Authorship Attribution

open access: yesIEEE Access
This paper is the fourth part of a research series that focuses on determining the authorship of Russian-language texts by analyzing short social media comments, including those from mass media and communities associated with destructive content ...
Anastasia Fedotova   +3 more
doaj   +1 more source

Providing Physical Layer Security for Mission Critical Machine Type Communication

open access: yes, 2017
The design of wireless systems for Mission Critical Machine Type Communication (MC-MTC) is currently a hot research topic. Wireless systems are considered to provide numerous advantages over wired systems in industrial applications for example.
Ambekar, Abhijit   +3 more
core   +1 more source

Integrated Technique of Natural Language Texts and Source Codes Authorship Verification in the Academic Environment

open access: yesIEEE Access
The issue of text plagiarism in academic and educational environments is becoming increasingly relevant every year. The quality of research articles and works is declining due to students copying fragments of others’ works and using modern ...
Aleksandr Romanov   +3 more
doaj   +1 more source

Study of Generalized Phase Spectrum Time Delay Estimation Method for Source Positioning in Small Room Acoustic Environment

open access: yesSensors, 2022
This paper considers the application of signal processing methods to passive indoor positioning with acoustics microphones. The key aspect of this problem is time-delay estimation (TDE) that is used to get the time difference of arrival of the source’s ...
Vladimir Faerman   +4 more
doaj   +1 more source

System of Systems Characterisation assisting Security Risk Assessment [PDF]

open access: yes2018 13th Annual Conference on System of Systems Engineering (SoSE), 2018
System of Systems (SoS) is a term often used to describe the coming together of independent systems, collaborating to achieve a new or higher purpose. However, clarity is needed when using this term given that operational areas may be unfamiliar with the terminology.
Ki-Aries, Duncan   +3 more
openaire   +1 more source

Watermarking for Social Networks Images With Improved Robustness Through Polar Codes

open access: yesIEEE Access
Protecting ownership of digital content is challenging in today’s online world, especially when sharing content through social networks and instant messengers.
Oleg Evsutin   +2 more
doaj   +1 more source

TIA: algorithms for development of identity-linked SNP islands for analysis by massively parallel DNA sequencing

open access: yesBMC Bioinformatics, 2018
Background Single nucleotide polymorphisms (SNPs) located within the human genome have been shown to have utility as markers of identity in the differentiation of DNA from individual contributors.
M. Heath Farris   +5 more
doaj   +1 more source

Battery Management System: Threat Modeling, Vulnerability Analysis, and Cybersecurity Strategy

open access: yesIEEE Access
The Battery Management System (BMS) plays a crucial role in modern energy storage technologies, ensuring battery safety, performance, and longevity. However, as the BMS becomes more sophisticated and interconnected, it faces increasing cybersecurity ...
Shravan Murlidharan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy