Filters








203,630 Hits in 7.2 sec

Universal Communication Interface through Web Services for Heterogeneous Systems with Dynamic System Life Cycle [article]

Samudaya Nanayakkara, Prasad Perera, Shantha Fernando
<span title="2021-11-20">2021</span> <i title="figshare"> figshare.com </i> &nbsp;
is based on human communication and conversation techniques.  ...  It also can handle a communication process even when one party is rapidly changing, and hence it allows continuous system developments independent of the communication interface.  ...  First, it was tested for secure communications and second, it was tested for compatibility of security policies. Figure 8 shows a set of information flowing through a secure channel.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.17056130.v1">doi:10.6084/m9.figshare.17056130.v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t2ima2v7zjbapatziebp4tlpgm">fatcat:t2ima2v7zjbapatziebp4tlpgm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211129201101/https://s3-eu-west-1.amazonaws.com/pfigshare-u-files/31540973/UniversalCommunicationInterfacethroughWebServicesforHeterogeneousSystemswithDynamicSystemLifeCycle.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&amp;X-Amz-Credential=AKIAIYCQYOYV5JSSROOA/20211129/eu-west-1/s3/aws4_request&amp;X-Amz-Date=20211129T201101Z&amp;X-Amz-Expires=10&amp;X-Amz-SignedHeaders=host&amp;X-Amz-Signature=428bc099431b5d21709a236dcdf3b36321628241beb8d08ccedc8c643a256571" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/86/12/8612e03d3632d3b8e974f0ad314e9d5293d8b73b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.17056130.v1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> figshare.com </button> </a>

Wireless Smart Home Security System Based on Android

LIANGYU CHEN, SEN ZHANG, QUANHU LI
<span title="2017-10-31">2017</span> <i title="DEStech Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/52spf3of4jbu5da2xrhvubclcy" style="color: black;">DEStech Transactions on Computer Science and Engineering</a> </i> &nbsp;
home security system.  ...  In recent years, smart home security industry has achieved rapid development, and people have increasing demand of smart home security system.  ...  of smart home security system based on Android.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dtcse/aiea2017/14981">doi:10.12783/dtcse/aiea2017/14981</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f3fpzrnqh5htzf6cx73tltrzgq">fatcat:f3fpzrnqh5htzf6cx73tltrzgq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720082718/http://dpi-proceedings.com/index.php/dtcse/article/download/14981/14495" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1e/c3/1ec3c634798a0423efaacd73c485a7d7ca819854.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dtcse/aiea2017/14981"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Universal Communication Interface through Web Services for Heterogeneous Systems with Dynamic System Life Cycle

Samudaya Nanayakkara, Prasad Perera, Shantha Fernando
<span title="2019-02-13">2019</span> <i title="Figshare"> Figshare </i> &nbsp;
The new protocol that is introduced in this research is based on human communication and conversation techniques.  ...  It also can handle a communication process even when one party is rapidly changing, and hence it allows continuous system developments independent of the communication interface.  ...  First, it was tested for secure communications and second, it was tested for compatibility of security policies. Figure 8 shows a set of information flowing through a secure channel.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.7712399">doi:10.6084/m9.figshare.7712399</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3jud2ejxrrhzfnkuskku3emrrm">fatcat:3jud2ejxrrhzfnkuskku3emrrm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200224042544/https://s3-eu-west-1.amazonaws.com/pfigshare-u-files/14357393/UniversalCommunicationInterfacethroughWebServicesforHeterogeneousSystemswithDynamicSystemLifeCycle.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/d7/6dd7628e4745ad78b00090b16eb640cb51c08b03.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.7712399"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> figshare.com </button> </a>

SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

Douglas Twitchell
<span title="">2007</span> <i title="Embry-Riddle Aeronautical University/Hunt Library"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lqkss6whbvgrrj56vjbfruobqy" style="color: black;">Journal of Digital Forensics, Security and Law</a> </i> &nbsp;
This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game.  ...  A major portion of government and business organizations' attempts to counteract information security threats is teams of security personnel.  ...  ACKNOWLEDGEMENTS This paper was originally presented at the 2007 Information Security Curriculum Development Conference, September 28-29, 2007, Kennesaw, Georgia, USA.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15394/jdfsl.2007.1029">doi:10.15394/jdfsl.2007.1029</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vnkgqqdwujc65m6yphgy46b4he">fatcat:vnkgqqdwujc65m6yphgy46b4he</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721023122/https://commons.erau.edu/cgi/viewcontent.cgi?article=1029&amp;context=jdfsl" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5e/b4/5eb44fd1bdeec81325f92863aea7cc326d8ee13f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15394/jdfsl.2007.1029"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

SecurityCom

Douglas P. Twitchell
<span title="">2007</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a3kaq56g7nhpffr54fol52ddki" style="color: black;">Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD &#39;07</a> </i> &nbsp;
This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game.  ...  A major portion of government and business organizations' attempts to counteract information security threats is teams of security personnel.  ...  ACKNOWLEDGEMENTS This paper was originally presented at the 2007 Information Security Curriculum Development Conference, September 28-29, 2007, Kennesaw, Georgia, USA.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1409908.1409919">doi:10.1145/1409908.1409919</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/infoseccd/Twitchell07.html">dblp:conf/infoseccd/Twitchell07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vzgnzaj4gndhvawgxbrxhxqqou">fatcat:vzgnzaj4gndhvawgxbrxhxqqou</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721023122/https://commons.erau.edu/cgi/viewcontent.cgi?article=1029&amp;context=jdfsl" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5e/b4/5eb44fd1bdeec81325f92863aea7cc326d8ee13f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1409908.1409919"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

OPC-MFuzzer: A Novel Multi-Layers Vulnerability Detection Tool for OPC Protocol Based on Fuzzing Technology

Xiong Qi, Peng Yong, Zhonghua Dai, Shengwei Yi, Ting Wang
<span title="">2014</span> <i title="IACSIT Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6ipxjczjyrbvhnfifbkcwfniw4" style="color: black;">International Journal of Computer and Communication Engineering</a> </i> &nbsp;
In this paper, a vulnerability detecting tool for OPC protocol based on Fuzzing technology named OPC-MFuzzer is proposed and implemented; three different test case generating mechanisms for the testing  ...  With the rapid development of information and Industrial Technology, as the common data accessing interface for data provider, OPC technology is more and more widely deployed in the acquiring and sharing  ...  His research interests include information security, security risk assessment, critical infrastructure protecting and security analysis of embedded system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijcce.2014.v3.339">doi:10.7763/ijcce.2014.v3.339</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4sgfqeucnjgsznjpvpue3a3utm">fatcat:4sgfqeucnjgsznjpvpue3a3utm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190429084237/http://www.ijcce.org/papers/339-T0019.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/4c/254cd8803df9311e64f0f3a426d11db02c603582.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijcce.2014.v3.339"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method

Junwei Tang, Jingjing Li, Ruixuan Li, Hongmu Han, Xiwu Gu, Zhiyong Xu
<span title="2019-10-31">2019</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
Based on the above ideas, we have implemented SSLDetecter, an efficient automated detection system of Android application SSL security vulnerability.  ...  Existing methods based on static decompiling technology to detect SSL security vulnerabilities of Android applications cannot cope with the increasingly common packed applications.  ...  SSL Security. ere are many researches on SSL security, including the research of the protocol and the use of SSL in Android applications.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/7193684">doi:10.1155/2019/7193684</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ldbrr77hfzgwvjsgdvyiew3eyq">fatcat:ldbrr77hfzgwvjsgdvyiew3eyq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200214042721/http://downloads.hindawi.com/journals/scn/2019/7193684.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/81/858126d595fe6ea4a7c8ff8ca2b44d190b09f0da.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/7193684"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Research on Testing and Verification of Internet of Things Technology Based on Edge Computing

HONG YANG, LI HAN, MENG-LIANG LI
<span title="2020-01-10">2020</span> <i title="DEStech Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/oepoggqi3bgnbds2j2j6zruxjy" style="color: black;">DEStech Transactions on Engineering and Technology Research</a> </i> &nbsp;
Therefore, it is necessary to carry out the research of testing and verification of IoT technology based on edge computing, tackle key technologies of edge computing, and develop test and verification  ...  to be processed on the edge.  ...  In this context, there is an urgent need to carry out the test and verification research of IoT technology based on edge computing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dtetr/amee2019/33475">doi:10.12783/dtetr/amee2019/33475</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xeqtmdq4krc5rk3636lb6mvk24">fatcat:xeqtmdq4krc5rk3636lb6mvk24</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200506202320/http://www.dpi-proceedings.com/index.php/dtetr/article/download/33475/32062" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/18/46/1846c0f7c2d712575b2ec938251389b4a5a37dd8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.12783/dtetr/amee2019/33475"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

End-to-End Mobile Communication Security Testbed Using Open Source Applications in Virtual Environment

K. Jijo George, A. Sivabalan, T. Prabhu, Anand R. Prasad
<span title="">2015</span> <i title="River Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ygvakwwlpvfrpb4j6w2wmjbwtm" style="color: black;">Journal of ICT Standardization</a> </i> &nbsp;
So as to prove the usability of the testbed, we reported some of the test results in this paper. These tests are mainly related to security. The test results prove that the testbed functions properly.  ...  The testbed consists of Global System for Mobiles (GSM), General Packet Radio Service (GPRS) and System Architecture Evolution/Long Term Evolution(SAE/LTE) elements implemented on a virtual platform.  ...  As a simple test on information disclosure vulnerability we check whether network information, in form of IP address, is sent to the UE. • Expected Result: In a secure mobile communication system there  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jicts2245-800x.314">doi:10.13052/jicts2245-800x.314</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5ycmvbf26jdindtfc2urmnjofq">fatcat:5ycmvbf26jdindtfc2urmnjofq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922031927/https://www.riverpublishers.com/journal/journal_articles/RP_Journal_2245-800X_314.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/dc/6ddcf4ade4b8a85b2f64289784529864d0ea7459.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jicts2245-800x.314"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Enhancing Traffic Safety with Mobile Applications

H Kaartinen, J Jämsä
<span title="2016-10-27">2016</span> <i title="Faculty of Mechanical Engineering, Informatics and Electrical Engineering"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4blm44yadnepplkqz5amw3fxc4" style="color: black;">Acta Technica Jaurinensis</a> </i> &nbsp;
Inter-cognitive communication is a form of communication where an information system gathers data and processes it to a form of which users can benefit on their decision making.  ...  Also, the data security has been studied and tested at Centria, and will be reported in this paper.  ...  The tests were executed and reported at Centria projects: European Celtic-Plus projects Co-operative Mobility Services of the Future (CoMoSeF) and Cyber-security in the Wireless Industrial use case (CyberWI  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14513/actatechjaur.v9.n3.419">doi:10.14513/actatechjaur.v9.n3.419</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f7jqpii6z5dd3o2ztkyairfa4q">fatcat:f7jqpii6z5dd3o2ztkyairfa4q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922230816/http://acta.sze.hu/index.php/acta/article/download/419/407" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3e/6c/3e6c7dc9e7a39e058439e7f19b8121cd0e6129ef.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14513/actatechjaur.v9.n3.419"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Smart grid protocol testing through cyber-physical testbeds

T. Yardley, R. Berthier, D. Nicol, W. H. Sanders
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/27x3jrhqazgjzmx2y7eq3hokgq" style="color: black;">2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT)</a> </i> &nbsp;
We present three main problems; the need for a methodology to define the appropriate tests, the need for a means of comparing and measuring the security of the system under scrutiny, and the current lack  ...  Sound cyber security testing is a critical challenge, in particular for large and complex systems such as the smart grid.  ...  This material is based upon work supported by the Department of Energy under Award Number DE-OE0000097. The authors also thank Jenny Applequist for her editorial assistance.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/isgt.2013.6497837">doi:10.1109/isgt.2013.6497837</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/isgt/YardleyBNS13.html">dblp:conf/isgt/YardleyBNS13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fjup7h4phbccjj26c2x77bhu6i">fatcat:fjup7h4phbccjj26c2x77bhu6i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20140823071216/http://tcipg.org/sites/default/files/papers/2013_Q1_Testbed1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/07/f4/07f4d1bd8caa27835909da8a42f99c2a592bea1d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/isgt.2013.6497837"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

IoT based Clinical Sensor Data Management and Transfer using Blockchain Technology

Dr. Haoxiang Wang
<span title="2020-07-08">2020</span> <i title="Inventive Research Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/scsmfiaerjaltjqhuuy4legei4" style="color: black;">Journal of ISMAC</a> </i> &nbsp;
In comparison with the traditional patient monitoring system, the proposed system offers better monitoring, improved connectivity and enhanced data security.  ...  Internet of Things, Cloud Computing, Blockchain technology, lab-on-chip, non-invasive and minimally invasive surgeries and so on has simplified several dreadful diseases.  ...  The hospital information systems security can be improved drastically on application of blockchain [9] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.36548/jismac.2020.3.003">doi:10.36548/jismac.2020.3.003</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gzeor42fmjhxtdv2mty5brkdwm">fatcat:gzeor42fmjhxtdv2mty5brkdwm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210814042807/https://www.irojournals.com/iroismac/V2/I3/03.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2c/7e/2c7efa58b080dfda49c467eb4e3d0880b077592f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.36548/jismac.2020.3.003"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Scalable Framework to Detect, Analyze, and Prevent Security Vulner abilities in Enterprise Software-Defined Networks

Bhumika Sapkota, Akalanka B. Mailewa
<span title="2022-10-02">2022</span> <i title="Genesis Global Publication"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ixhfeozjs5hwvejbi36jwrssjm" style="color: black;">International Journal of Research Publication and Reviews</a> </i> &nbsp;
Software Defined Networking (SDN) is a rapidly growing technology that is enabling innovation on how network systems are designed and managed.  ...  Throughout the paper, the proposed framework is implemented and tested for its success in satisfying some of the basic and crucial security requirements.  ...  One of the primary motivations for this research is to bridge the gap between the necessity and availability of a well-tested security framework for enterprise networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.55248/gengpi.2022.3.2.1">doi:10.55248/gengpi.2022.3.2.1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3kpxvf5fffbx3l5r2dcazef7cy">fatcat:3kpxvf5fffbx3l5r2dcazef7cy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220430081550/https://ijrpr.com/uploads/V3ISSUE2/ijrpr2643-a-scalable-framework-to-detect-analyze-and-prevent-security-vulner.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/b9/d4b903d926cd8a4215e173e73467cb0e18802435.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.55248/gengpi.2022.3.2.1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

High-Level Architecture for a Single Location Surveillance Point

Tomi Raty
<span title="">2007</span> <i title="IEEE"> 2007 Third International Conference on Wireless and Mobile Communications (ICWMC&#39;07) </i> &nbsp;
The research is based on the constructive method of the related publications and technologies and the results are derived by the abstractive analysis of the available material.  ...  The SLSP system decreases the amount of redundant information that otherwise would be handled by the human security administrator and the security personnel.  ...  Recently, considerable research efforts have been concentrated on video-based surveillance systems, especially for public safety and transportation systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icwmc.2007.46">doi:10.1109/icwmc.2007.46</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dx2a4easyzcttbxa3uoh7vojkq">fatcat:dx2a4easyzcttbxa3uoh7vojkq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809110615/http://www.vtt.fi/inf/julkaisut/muut/2007/High_level_architecture_for_a_single_location_surveillance_point.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c3/6c/c36ca4dc91b179aecd63cbadf347460f72ff6aab.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icwmc.2007.46"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Designing Home Security Monitoring System Based Internet of Things(IoTs) Model

Dedi Satria, Hendri Ahmadian
<span title="2018-01-26">2018</span> <i title="Universitas Serambi Mekkah"> Jurnal Serambi Engineering </i> &nbsp;
Therefore, there needs to be integration of home security system which can be integrated with internet based information system as one of innovation in security system.  ...  The research resulted in a series of home security information system prototype based internet information and has successfully accessed through an Internet browser in the form of home security information  ...  Acknowledgments We would like to thank the Ministry of Research and Higher Education (Ristekdikti) for the support in the form of a grant fund of Penelitian Dosen Pemula.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32672/jse.v3i1.354">doi:10.32672/jse.v3i1.354</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bzqpykongbf4vdz4y447vmuvnu">fatcat:bzqpykongbf4vdz4y447vmuvnu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190710001121/http://ojs.serambimekkah.ac.id:80/index.php/jse/article/download/354/321" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/97/4e/974e9d6ae88068f3616ea20f8914bde87bf5f2cc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32672/jse.v3i1.354"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 203,630 results