Results 31 to 40 of about 1,298,703 (336)
A Review of IoT Firmware Vulnerabilities and Auditing Techniques
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity.
Taimur Bakhshi +2 more
doaj +1 more source
The Application of Kalman Filter Algorithm in Rail Transit Signal Safety Detection
With the speedy prosperity and popularization of wireless communication, the informatization and automation level of rail transit systems is also improved.
Zhinong Miao, Qilong Liao
doaj +1 more source
Multi-factor Dummy Location Selection Algorithm in Location-based Service [PDF]
In view of the existing dummy location selection methods in LBS snapshot location privacy protection,the background knowledge attack caused by the time factor of the location itself is ignored,and the sensitive locations are treated equally.Based on this,
LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
doaj +1 more source
KECO: toward efficient task offloading in mobile edge computing with federated knowledge distillation [PDF]
With the diversification and personalization of mobile user demands, as well as the rapid development of distributed computing technology, leveraging mobile edge computing task offloading to provide users with convenient services has become a research ...
Zhuang Liu, Dong Li, Panfei Yang
doaj +2 more sources
This paper utilizes the ELECTRA Modbus dataset to present a secure and resilient anomaly detection framework for Industrial Control Systems (ICS). The proposed system integrates multiple machine learning models—including Random Forest, Neural ...
Archana Pallakonda +4 more
doaj +1 more source
Organizations constantly exposed to cyber threats are compelled to comply with cyber security standards and policies for protecting their digital assets.
Mohamed Chahine Ghanem +3 more
doaj +1 more source
Security Testing With Python Scripts
Cyber security is one of the main issues that is discussed today everywhere in the world. The development of technology has grown rapidly and it is important that this development should be done simultaneously with the increase in security. When we talk
Frida ZISKO, Alma HYRA
doaj +2 more sources
Semi-device-independent security of one-way quantum key distribution
By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being 'device-independent'. Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD ...
Brunner, Nicolas, Pawlowski, Marcin
core +1 more source
User interface design for mobile-based sexual health interventions for young people: Design recommendations from a qualitative study on an online Chlamydia clinical care pathway [PDF]
Background: The increasing pervasiveness of mobile technologies has given potential to transform healthcare by facilitating clinical management using software applications.
Estcourt, C +7 more
core +5 more sources
occumb: An R package for site occupancy modeling of eDNA metabarcoding data
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley +1 more source

