Results 31 to 40 of about 1,298,703 (336)

A Review of IoT Firmware Vulnerabilities and Auditing Techniques

open access: yesSensors
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity.
Taimur Bakhshi   +2 more
doaj   +1 more source

The Application of Kalman Filter Algorithm in Rail Transit Signal Safety Detection

open access: yesIEEE Access
With the speedy prosperity and popularization of wireless communication, the informatization and automation level of rail transit systems is also improved.
Zhinong Miao, Qilong Liao
doaj   +1 more source

Multi-factor Dummy Location Selection Algorithm in Location-based Service [PDF]

open access: yesJisuanji kexue
In view of the existing dummy location selection methods in LBS snapshot location privacy protection,the background knowledge attack caused by the time factor of the location itself is ignored,and the sensitive locations are treated equally.Based on this,
LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
doaj   +1 more source

KECO: toward efficient task offloading in mobile edge computing with federated knowledge distillation [PDF]

open access: yesPeerJ Computer Science
With the diversification and personalization of mobile user demands, as well as the rapid development of distributed computing technology, leveraging mobile edge computing task offloading to provide users with convenient services has become a research ...
Zhuang Liu, Dong Li, Panfei Yang
doaj   +2 more sources

Secure and Resilient Cyberattack Detection in ICS Networks: Hybrid Encryption, Protocol Hardening, and Threat Hunting on ELECTRA Modbus Traffic

open access: yesIEEE Access
This paper utilizes the ELECTRA Modbus dataset to present a secure and resilient anomaly detection framework for Industrial Control Systems (ICS). The proposed system integrates multiple machine learning models—including Random Forest, Neural ...
Archana Pallakonda   +4 more
doaj   +1 more source

ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance

open access: yesIEEE Access, 2023
Organizations constantly exposed to cyber threats are compelled to comply with cyber security standards and policies for protecting their digital assets.
Mohamed Chahine Ghanem   +3 more
doaj   +1 more source

Security Testing With Python Scripts

open access: yesSmart Cities and Regional Development Journal, 2023
Cyber security is one of the main issues that is discussed today everywhere in the world. The development of technology has grown rapidly and it is important that this development should be done simultaneously with the increase in security. When we talk
Frida ZISKO, Alma HYRA
doaj   +2 more sources

Semi-device-independent security of one-way quantum key distribution

open access: yes, 2011
By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being 'device-independent'. Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD ...
Brunner, Nicolas, Pawlowski, Marcin
core   +1 more source

User interface design for mobile-based sexual health interventions for young people: Design recommendations from a qualitative study on an online Chlamydia clinical care pathway [PDF]

open access: yes, 2015
Background: The increasing pervasiveness of mobile technologies has given potential to transform healthcare by facilitating clinical management using software applications.
Estcourt, C   +7 more
core   +5 more sources

occumb: An R package for site occupancy modeling of eDNA metabarcoding data

open access: yesPopulation Ecology, EarlyView.
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley   +1 more source

Home - About - Disclaimer - Privacy