Zobrazeno 1 - 10
of 243
pro vyhledávání: '"Aiqun HU"'
Publikováno v:
Electronics Letters, Vol 60, Iss 10, Pp n/a-n/a (2024)
Abstract In recent years, key generation schemes based on the reciprocity of wireless channels have gained widespread attention in the field of wireless physical layer security. However, due to the openness of wireless channels, eavesdroppers may obt
Externí odkaz:
https://doaj.org/article/de89df73b98443f9a115c7b9960da8f2
Publikováno v:
Symmetry, Vol 16, Iss 7, p 846 (2024)
Unauthenticated device access to a network presents substantial security risks. To address the challenges of access and identification for a vast number of devices with diverse functions in the era of the Internet of things (IoT), we propose an IoT d
Externí odkaz:
https://doaj.org/article/9aea62d11cbe46c88f799dbcaac10111
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 4, Pp 1668-1681 (2023)
The radio frequency fingerprint (RFF)-based device identification is a promising physical layer authentication technique. However, the wireless channel significantly affects the RFF features of the wideband wireless devices. In this paper, we extensi
Externí odkaz:
https://doaj.org/article/0ac1485c5c8c44b9813077701a370434
Publikováno v:
Symmetry, Vol 16, Iss 2, p 249 (2024)
Industrial control terminals play an important role in industrial control scenarios. Due to the special nature of industrial control networks, industrial control terminal systems are vulnerable to malicious attacks, which can greatly threaten the sta
Externí odkaz:
https://doaj.org/article/32844bb6db3047709f993218a913c660
Publikováno v:
网络与信息安全学报, Vol 8, Pp 183-189 (2022)
Considering the requirements of cyberspace security talents training, this paper explored the direction and emphases of ideological and political education with the course of “new progress in cyberspace security” as an example.Ideological and pol
Externí odkaz:
https://doaj.org/article/c84b389b083440809f0ddac83183ec2c
Publikováno v:
Tongxin xuebao, Vol 42, Pp 171-181 (2021)
To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was gen
Externí odkaz:
https://doaj.org/article/641f24f6a24249698ee129b40675deba
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2021, Iss 1, Pp 1-27 (2021)
Abstract With the dramatic development of the internet of things (IoT), security issues such as identity authentication have received serious attention. The radio frequency (RF) fingerprint of IoT device is an inherent feature, which can hardly be im
Externí odkaz:
https://doaj.org/article/6f0cb1b6bbe24be99659c37560e2e809
Publikováno v:
网络与信息安全学报, Vol 7, Pp 11-19 (2021)
Shell-based security defense technologies such as firewall, intrusion detection and anti-virus cannot be updated in a timely fashion upon identification of attacks.The security defense mechanism is not associated with the security status of network d
Externí odkaz:
https://doaj.org/article/ff2f2ee3df2c4db7bdfd19bfb37585c6
Publikováno v:
IEEE Access, Vol 8, Pp 138406-138446 (2020)
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our everyday life by connecting everyone and everything together. The massive number of devices are preferably connected wirelessly because of the easy installment
Externí odkaz:
https://doaj.org/article/4ba1727fa4b046d5a31b1fd1ec923ff6
Publikováno v:
Frontiers in Energy Research, Vol 9 (2022)
5G communication technology provides strong support for the power Internet of Things, and it also introduces new security challenges in the application process of the power industry. Starting from the analysis of the power 5G business requirements, t
Externí odkaz:
https://doaj.org/article/6d72bc4216b748e79160ffb9af913e0d