Results 61 to 70 of about 2,352,522 (144)

An analysis of security issues in building automation systems [PDF]

open access: yes, 2014
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core   +2 more sources

Energy security issues in contemporary Europe [PDF]

open access: yes, 2018
Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over ...
Abrhám, Josef   +3 more
core  

Security of Smart Home-Smartphones Systems

open access: yes2020 15th Iberian Conference on Information Systems and Technologies (CISTI), 2020
With technology increasingly present in people’s lives, smart homes are gaining more and more impact each day. While in the past smart homes consisted in presence sensors, cameras and automatic shutters, nowadays they are composed of several sensors and equipment that can control and monitor different things, such as temperature or heat. The homeowners
Teixeira, Diogo   +2 more
openaire   +2 more sources

Multi-Layer IoT Security Framework for Ambient Intelligence Environments

open access: yesSensors, 2019
Ambient intelligence is a new paradigm in the Internet of Things (IoT) world that brings smartness to living environments to make them more sensitive; adaptive; and personalized to human needs.
Ion Bica   +3 more
doaj   +1 more source

Learning-in-Games Approach for the Mission Planning of Autonomous Multi-Drone Spatio-Temporal Sensing

open access: yesIEEE Access
Mission planners are one of the major classes of autonomy software and their design is especially challenging in the case cooperation autonomy is required for unmanned multi-vehicle systems.
Vittorio U. Castrillo   +4 more
doaj   +1 more source

Electronic Security Systems in Academic Libraries: A Case Study of Three University Libraries in South-West Nigeria. [PDF]

open access: yes, 2011
This study examines the effectiveness of electronic security systems in academic libraries with a focus on selected university libraries in South-West Nigeria.
Osayande, Odaro
core   +1 more source

Provenance Threat Modeling

open access: yes, 2017
Provenance systems are used to capture history metadata, applications include ownership attribution and determining the quality of a particular data set.
Brooks, Richard R.   +5 more
core   +1 more source

DLT Based Authentication Framework for Industrial IoT Devices

open access: yesSensors, 2020
The latest technological progress in the industrial sector has led to a paradigm shift in manufacturing efficiency and operational cost reduction. More often than not, this cost reduction comes at the price of dismissing information security, especially ...
Cristian Lupascu   +2 more
doaj   +1 more source

Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

open access: yes, 2015
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system.
Hof, Hans-Joachim
core   +1 more source

IDENTIFICATION OF SMALL LAKES IN KAZAKHSTAN USING REMOTE SENSING DATA

open access: yesZbornik Radova: Geografski institut "Jovan Cvijić"
The purpose of this study is to develop a methodology for automated determination of water surfaces and identification of small lakes in Kazakhstan using cartographic methods and an array of multi-time remote sensing (RS) data.
Akmaral Tolepbayeva   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy