Results 51 to 60 of about 2,352,522 (144)
Formal Template-Based Generation of Attack–Defence Trees for Automated Security Analysis
Systems that integrate cyber and physical aspects to create cyber-physical systems (CPS) are becoming increasingly complex, but demonstrating the security of CPS is hard and security is frequently compromised.
Jeremy Bryans +4 more
doaj +1 more source
Integrating security and usability into the requirements and design process [PDF]
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core +1 more source
Semantic Clustering and Transfer Learning in Social Media Texts Authorship Attribution
This paper is the fourth part of a research series that focuses on determining the authorship of Russian-language texts by analyzing short social media comments, including those from mass media and communities associated with destructive content ...
Anastasia Fedotova +3 more
doaj +1 more source
Providing Physical Layer Security for Mission Critical Machine Type Communication
The design of wireless systems for Mission Critical Machine Type Communication (MC-MTC) is currently a hot research topic. Wireless systems are considered to provide numerous advantages over wired systems in industrial applications for example.
Ambekar, Abhijit +3 more
core +1 more source
The issue of text plagiarism in academic and educational environments is becoming increasingly relevant every year. The quality of research articles and works is declining due to students copying fragments of others’ works and using modern ...
Aleksandr Romanov +3 more
doaj +1 more source
This paper considers the application of signal processing methods to passive indoor positioning with acoustics microphones. The key aspect of this problem is time-delay estimation (TDE) that is used to get the time difference of arrival of the source’s ...
Vladimir Faerman +4 more
doaj +1 more source
System of Systems Characterisation assisting Security Risk Assessment [PDF]
System of Systems (SoS) is a term often used to describe the coming together of independent systems, collaborating to achieve a new or higher purpose. However, clarity is needed when using this term given that operational areas may be unfamiliar with the terminology.
Ki-Aries, Duncan +3 more
openaire +1 more source
Watermarking for Social Networks Images With Improved Robustness Through Polar Codes
Protecting ownership of digital content is challenging in today’s online world, especially when sharing content through social networks and instant messengers.
Oleg Evsutin +2 more
doaj +1 more source
Background Single nucleotide polymorphisms (SNPs) located within the human genome have been shown to have utility as markers of identity in the differentiation of DNA from individual contributors.
M. Heath Farris +5 more
doaj +1 more source
Battery Management System: Threat Modeling, Vulnerability Analysis, and Cybersecurity Strategy
The Battery Management System (BMS) plays a crucial role in modern energy storage technologies, ensuring battery safety, performance, and longevity. However, as the BMS becomes more sophisticated and interconnected, it faces increasing cybersecurity ...
Shravan Murlidharan +3 more
doaj +1 more source

