Results 101 to 110 of about 8,112 (198)

Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies

open access: yesFrontiers in Computer Science
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data, actuators that perform mechanical actions on the sensor's collected data, and gateways used as an interface for effective communication with the external world ...
Kawalpreet Kaur   +4 more
doaj   +1 more source

How Cyber-Resilient Are Unmanned Aircraft Systems? A Systematic Meta-Review

open access: yesAerospace
Unmanned Aircraft Systems (UASs) offer a promising future for aviation operations, even though it suffers larger cyber-related challenges. As such, cyber-resilience becomes a core property for drones’ operations.
Andrea Montaruli   +2 more
doaj   +1 more source

Mitigating Crossfire Attacks via Topology Spoofing Based on ENRNN-MTD

open access: yesApplied Sciences
Crossfire attacks disrupt network services by targeting critical links of server groups, causing traffic congestion and server failures that prevent legitimate users from accessing services. To counter this threat, this study proposes a novel topology spoofing defense mechanism based on a sequence-based Graph Neural Network–Moving Target Defense (ENRNN-
Dexian Chang   +3 more
openaire   +1 more source

Understanding and mitigating GPS spoofing attacks in shipping

open access: yes
Καθώς οι κρίσεις στον κυβερνοχώρο στον τομέα της ναυσιπλοΐας γίνονται όλο και πιο εμφανείς και οι επιθέσεις GPS Spoofing όλο και πιο συχνές, η παρούσα διατριβή αποσκοπεί στην καλύτερη γνώση του αναγνώστη σχετικά με το θέμα «Κατανόηση και μετριασμός του GPS Spoofing στη θαλάσσια ναυσιπλοΐα».
openaire   +1 more source

Home - About - Disclaimer - Privacy