Results 111 to 120 of about 32,551 (228)

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, Volume 29, Issue 2, Page 354-367, March 2026.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Medical Data in Wireless Body Area Networks: Device Authentication Techniques and Threat Mitigation Strategies Based on a Token-Based Communication Approach

open access: yesNetwork
Wireless Body Area Networks (WBANs), low power, and short-range wireless communication in a near-body area provide advantages, particularly in the medical and healthcare sector: (i) they enable continuous monitoring of patients and (ii) the recording and
Jan Herbst   +4 more
doaj   +1 more source

Federated Learning and 5G/6G‐Based Internet of Medical Things (IoMT): Applications, Key Enabling Technologies, Open Issues and Future Research Directions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad   +6 more
wiley   +1 more source

Frontex and the University: Positivist Dissonance and the Institutionalisation of Border Violence through Research

open access: yesAntipode, Volume 58, Issue 2, March 2026.
Abstract The paper examines the existing relationships between universities and Frontex, investigating and problematising the intersection between the higher education sector and the violence of the European border regime. We introduce the concept of positivist dissonance to conceptualise these relationships within the wider “industrial‐military ...
Giulia Corgnier   +3 more
wiley   +1 more source

Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management

open access: yesIET Networks
Forests play a pivotal role in protecting the environment, preserving vital natural resources, and ultimately sustaining human life. However, the escalating occurrences of forest fires, whether of human origin or due to climate change, poses a ...
Alireza Etaati   +2 more
doaj   +1 more source

Optimization in Telecommunication Networks [PDF]

open access: yes
Network design and network synthesis have been the classical optimization problems intelecommunication for a long time. In the recent past, there have been many technologicaldevelopments such as digitization of information, optical networks, internet ...
Hoesel,Stan,van
core   +1 more source

Flood Risk Assessment of Urban Critical Infrastructures Using Crowd‐Sourced and Open Data on Hazard, Exposure and Vulnerability

open access: yesJournal of Flood Risk Management, Volume 19, Issue 1, March 2026.
ABSTRACT Worldwide, cities rely on the proper functioning of critical infrastructures (CIs) such as electricity, telecommunication, water supply and transportation. Failure of those infrastructures can lead to significant and long‐lasting impacts, even far beyond the flooded areas due to cascading effects.
Andreas Burzel   +2 more
wiley   +1 more source

On the Design of Fault-Tolerant Logical Topologies in Wavelength-RoutedNetworks supporting Packet Datagrams [PDF]

open access: yes, 2004
Ajmone Marsan, Marco Giuseppe   +4 more
core   +1 more source

Energy efficiency of femtocell deployment in combined wireless/optical access networks [PDF]

open access: yes, 2013
Aleksic, Slavisa   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy