Results 31 to 40 of about 5,764,266 (332)
Over-the-air software updates in the internet of things : an overview of key principles [PDF]
Due to the fast pace at which IoT is evolving, there is an increasing need to support over-theair software updates for security updates, bug fixes, and software extensions. To this end, multiple over-the-air techniques have been proposed, each covering a
Bauwens, Jan +4 more
core +1 more source
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective
Increasing the number of threats against software vulnerabilities and rapidly growing data breaches have become a key concern for both the IT industry and stakeholders.
A. Agrawal +7 more
semanticscholar +1 more source
A High-Efficiency Data Collection Method Based on Maximum Recharging Benefit in Sensor Networks
To reduce time delays during data collection and prolong the network lifetime in Wireless Rechargeable Sensor Networks (WRSNs), a type of high-efficiency data collection method based on Maximum Recharging Benefit (DCMRB) is proposed in this paper ...
Chao Sha +3 more
doaj +1 more source
The class imbalance problem negatively impacts learning algorithms’ performance in minority classes which may constitute more severe attacks than the majority ones.
Seyed Mohammad Hadi Mirsadeghi +3 more
doaj +1 more source
Vulnerability anti-patterns:a timeless way to capture poor software practices (Vulnerabilities) [PDF]
There is a distinct communication gap between the software engineering and cybersecurity communities when it comes to addressing reoccurring security problems, known as vulnerabilities.
Coull, Natalie +3 more
core +2 more sources
An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data
Traditional searchable encryption schemes adopting the bag-of-words model occupy massive space to store the document set's index, where the dimension of the document vector is equal to the scale of the dictionary.
Xuelong Dai +4 more
doaj +1 more source
Nowadays every provider of critical infrastructure is obliged to use alarm systems - mainly simple surveillance CCTV cameras - to increase security and safety of those objects.
Zuzana Kurillova +2 more
doaj +1 more source
An Adaptive Ensemble Machine Learning Model for Intrusion Detection
In recent years, advanced threat attacks are increasing, but the traditional network intrusion detection system based on feature filtering has some drawbacks which make it difficult to find new attacks in time.
Xianwei Gao +4 more
doaj +1 more source
Medical Device Safety Management Using Cybersecurity Risk Analysis
Hospital biomedical engineering teams are responsible for establishing and regulating medical equipment management programs (MEMPs); these programs ensure the safety and reliability of medical devices.
Dong-Won Kim +2 more
doaj +1 more source
Tunable band-structures of MSe2/C3N (M = Mo and W) van der Waals Heterojunctions
Van der Waals (vdW) heterojunctions constructed using two-dimensional (2D) materials have shown excellent properties for applications in various fields. In this study, the structural and electronic properties of 2D MoSe _2 /C _3 N and WSe _2 /C _3 N vdW ...
Zixiang Liu +4 more
doaj +1 more source

