Results 11 to 20 of about 144,734 (270)
Analisis kebijakan standardisasi keamanan perangkat telekomunikasi untuk menunjang kebijakan pertahanan dan keamanan nasional [Policy analysis on telecommunication devices security standardization to support national security and defence policy] [PDF]
Beberapa tahun terakhir, kejadian yang terkait dengan pembobolan informasi meningkat dengan signifikan dan menyebabkan kerugian yang tidak sedikit baik bagi pemerintah, industri maupun perorangan.
Wirianto Pradono, Yourdan Yourdan
doaj +3 more sources
Energy‐efficient covert communication with adaptive assist nodes group
In this paper, a joint detection strategy of Willie based on two phases observation is proposed and an energy‐efficient covert communication scheme with an adaptive assist nodes group (AANG) based on uniform jamming power (UJP) strategy is proposed to ...
Zehan Wan +4 more
doaj +1 more source
To address the high-precision trajectory tracking task of uncertain robotic manipulators, a continuous sliding mode control (CSMC) scheme based on time-varying disturbance estimation and compensation is developed.
Juan Xian +3 more
doaj +1 more source
Modular quantum circuits for secure communication
Quasi‐chaotic generators are used for producing a pseudorandom behaviour that can be used for encryption/decryption and secure communications, introducing an implementation of them based on quantum technology.
Andrea Ceschini +2 more
doaj +1 more source
Online social networks are increasingly connecting people around the world. Influence maximization is a key area of research in online social networks, which identifies influential users during information dissemination.
Jie Tong +4 more
doaj +1 more source
QPSK-Modulation Modem Invariant to the Rotation of the Signal Constellation Plane
In order to increase the efficiency of dedicated frequency channels, i.e. to increase the specific data transfer rate, multipositional quadrature phase shift keying (QPSK, aka 4-PSK) should be used.
Sadchenko Andrey, Kushnirenko Oleg
doaj +1 more source
Telecom network fraud has become the most common and concerning type of crime and is an important public security incident that threatens urban resilience.
Tuo Shi, Jie Fu, Xiaofeng Hu
doaj +1 more source
Security Trust Zone in 5G Networks
Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds.
Dohler, Mischa +4 more
core +1 more source
Protecting Infinite Data Streams from Wearable Devices with Local Differential Privacy Techniques
The real-time data collected by wearable devices enables personalized health management and supports public health monitoring. However, sharing these data with third-party organizations introduces significant privacy risks.
Feng Zhao, Song Fan
doaj +1 more source
With the large-scale application of 5G in industrial production, the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.
Runchen Gao, Shen Li, Yuqi Gao, Rui Guo
doaj +1 more source

