A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Data Gathering Techniques in WSN: A Cross-Layer View
2022
Sensors
Wireless sensor networks (WSNs) have taken a giant leap in scale, expanding their applicability to a large variety of technological domains and applications, ranging from the Internet of things (IoT) for ...
This expansion is rapidly growing every passing day in terms of the variety, heterogeneity and the number of devices which such applications support. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s22072650
pmid:35408263
pmcid:PMC9002776
fatcat:x3mwuhes7nayhfp6z7geve5yfq
Securing Public Safety Communications on Commercial and Tactical 5G Networks: A Survey and Future Research Directions
2021
IEEE Open Journal of the Communications Society
Two solutions are trialed and described in more detail: remote attestation enhanced access control for constrained devices, and securing of satellite backhauls. ...
We explore and survey security architecture and enablers for prioritized public safety communication in 5G networks. ...
ACKNOWLEDGMENT The authors would like to thank the members of the cybersecurity working group of the PRIORITY project. The authors thank also Kalle Lähetkangas and Topias Uotila for helpful comments. ...
doi:10.1109/ojcoms.2021.3093529
fatcat:5d66gh3b2vcinddaml44oznpqe
On the Design and Implementation of Structured P2P VPNs
[article]
2010
arXiv
pre-print
Our model also provides the first design and implementation of a P2P VPN with full tunneling support, whereby all non-P2P based Internet traffic routes through a trusted third party and does so in a way ...
In recent years, there has been a paradigm shift towards the use of P2P in VPNs to alleviate pressure placed upon the central server by allowing participants to communicate directly with each other, relegating ...
they come from a specific domain. ...
arXiv:1001.2575v1
fatcat:kgqmyd7idvfqdg3ovf32q5lwqa
Organisational Security Dependent on Individual Privacy
2020
SN Computer Science
To illustrate it we develop a model of actors and data flows and discuss three scenarios in which the confidentiality achievable by an organisation is limited by the privacy of its members. ...
Sufficient data on those members can be leveraged in a so-called abduction attack aiming to extract confidential information from the organisation. ...
This article is part of the topical collection "Future Data and Security Engineering 2019" guest edited by Tran Khanh Dang. Acknowledgments Open Access funding provided by Projekt DEAL. ...
doi:10.1007/s42979-020-00206-y
fatcat:yb5ig7eegvgrxcxugsdm7psgry
SOME INVESTIGATIONS ON IMPROVING PERFORMANCE OF FADING CANNELS IN MANETS
2021
Zenodo
SOME INVESTIGATIONS ON IMPROVING PERFORMANCE OF FADING CANNELS IN MANETS: D.Sc Thesis. ...
Accordingly fading channels which are self-reliant are employed to transmit two signals initiates gain in to the system, which is attained by self-reliant interleaving I and Q channels. ...
In QPSK based Grover searching algorithm all coordinates are interleaved self-reliant and diversity order is raised by a factor of two. ...
doi:10.5281/zenodo.5148816
fatcat:3p7mvkqddfa6naoaz55fnelolq
Cyber-physical systems: Milestones and research challenges
2012
Computer Communications
(2010-0022076), and in part by the DGIST R&D Program of the Ministry of Education, Science and Technology of Korea (12-BD-0404). ...
Acknowledgements This work was supported in part by the Basic Science Research Program through the National Research Foundation (NRF) of Korea funded by the Ministry of Education, Science and Technology ...
Distributed control in a certain self-reliant power-service area is a critical means to modernize the power system to be the so-called smart grid. ...
doi:10.1016/j.comcom.2012.09.006
fatcat:iow2gcdzdfcy3j4fogi67dd3ni
Lessons for New Zealand lifelines organisations from the 17 January 1995 Great Hanshin earthquake
1996
Bulletin of the New Zealand Society for Earthquake Engineering
This report outlines the observations and findings with regard to lifelines and other infrastructural items from each of the various New Zealand post-earthquake visits to Kobe subsequent to the NZNSEE ...
The preliminary assessments on lifelines aspects made in the NZNSEE reconnaissance team report are developed further. Lessons and recommendations for New Zealand are presented. ...
The unavailability of key road and rail routes has been the single biggest hindrance to the recovery process in Kobe. • The importance of people being self-reliant for at least three days (in both home ...
doi:10.5459/bnzsee.29.1.1-55
fatcat:p5x44n4ncbbjdbv6ehgfxwfgf4
Table of Contents
2019
2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT)
Privacy in Mobile
Apps and Detecting Privacy Leaks
1253-1258
216.
505
Swati A Gavali, Vijay P. ...
Integration of Renewable Energy sources
for Self-reliant building
694-698
109.
172
Rajalakshmi Menon, Jeno
Paul, Gomathy S,
Rajalakshy S, Lakshmipriya
K J
A Modified High Gain Boost ConverterFor ...
doi:10.1109/icicict46008.2019.8993164
fatcat:2dqqs6g7u5bcxemzh6ivyyhavq
The Ethical Implications of Digital Contact Tracing for LGBTQIA+ Communities
[article]
2021
arXiv
pre-print
The onset of COVID-19 has led to the introduction of far-reaching digital interventions in the interest of public health. ...
In this research paper, we explore some of the ethical implications of digital contact tracing for the LGBTQIA+ community. ...
In what follows, we review the seminal literature in the domain of digital ethics and Big Tech in the context of the current pandemic. ...
arXiv:2108.10096v1
fatcat:kgnmwt6hmzblhlldem6t7slkvu
Deep Learning in Mobile and Wireless Networking: A Survey
2019
IEEE Communications Surveys and Tutorials
Subsequently, we provide an encyclopedic review of mobile and wireless networking research based on deep learning, which we categorize by different domains. ...
The recent success of deep learning underpins new and powerful tools that tackle problems in this space. ...
In [508] , they design PassGAN, which learns the distribution of a set of leaked passwords. ...
doi:10.1109/comst.2019.2904897
fatcat:xmmrndjbsfdetpa5ef5e3v4xda
Machine learning and data analytics for the IoT
[article]
2020
arXiv
pre-print
The Internet of Things (IoT) applications have grown in exorbitant numbers, generating a large amount of data required for intelligent data processing. ...
., cloud, edge, fog) and the limitations of the IoT application layer protocols in transmitting/receiving messages become the barriers in creating intelligent IoT applications. ...
Acknowledgements We thank the anonymous reviewers for their valuable comments which helped us improve the quality, organization and presentation of this paper. ...
arXiv:2007.04093v1
fatcat:no4spywa75esjel7dol3pi4etm
Deep Learning in Mobile and Wireless Networking: A Survey
[article]
2019
arXiv
pre-print
Subsequently, we provide an encyclopedic review of mobile and wireless networking research based on deep learning, which we categorize by different domains. ...
The recent success of deep learning underpins new and powerful tools that tackle problems in this space. ...
In [505] , they design PassGAN, which learns the distribution of a set of leaked passwords. ...
arXiv:1803.04311v3
fatcat:awuvyviarvbr5kd5ilqndpfsde
Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alcohol Nanocomposite Thin Films
2015
International Journal of Science and Engineering Applications
The major interest in designing this protocol is to make very few requirements of the client in terms of processing (Richardson, 2010). ...
This research therefore incorporated a self-signed Secure Socket Layer (SSL) certificate in the android app to enable secure encrypted connections to be established between the android app and the remote ...
CONCLUSIONS Based on the experimental result, it prooves that the website of this research can be used to give the information of routes, maps, varying types of bemo lines using any size of ...
doi:10.7753/ijsea0404.1001
fatcat:2fr7pbjz5ngsplez7cvthiht5e
Security Considerations for Internet of Things: A Survey
2020
SN Computer Science
After a review of the relevant, online literature on the topic and after looking at the market trends and developments, one can notice that there are still concerns with regard to security in IoT products ...
However, the security of these connected Internet of things (IoT) plays a centric role with no margin for error. ...
Further, modus operandi and detection of intrusion for network assaults like the Mirai IoT botnet, denial of service (DoS), and routing attacks were presented. ...
doi:10.1007/s42979-020-00201-3
fatcat:4gkafccu7vgq7olrqdxdpgm2eu
Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap
[article]
2019
arXiv
pre-print
Overall, the notion of resilience can be thought of in the light of three main sources of lack of resilience, as follows: exogenous factors, such as natural variations and attack scenarios; mismatch between ...
In the paper, our focus is on design and deployment innovations that are broadly applicable across a range of CPS application areas. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. ...
arXiv:2001.00090v1
fatcat:zaybw5wyfbayhcu34q2douctme
« Previous
Showing results 1 — 15 out of 810 results