Zobrazeno 1 - 10
of 223
pro vyhledávání: '"Andrei Gurtov"'
Autor:
Oumaima Chakir, Abdeslam Rehaimi, Yassine Sadqi, El Arbi Abdellaoui Alaoui, Moez Krichen, Gurjot Singh Gaba, Andrei Gurtov
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 3, Pp 103-119 (2023)
Cybersecurity attacks that target software have become profitable and popular targets for cybercriminals who consciously take advantage of web-based vulnerabilities and execute attacks that might jeopardize essential industry 5.0 features. Several ma
Externí odkaz:
https://doaj.org/article/134a299f2cf74ce6853737e7cd4b3860
Publikováno v:
IEEE Access, Vol 10, Pp 96038-96052 (2022)
The integration of satellite and terrestrial networks has become inevitable in the next generations of communications networks due to emerging needs of ubiquitous connectivity of remote locations. New and existing services and critical infrastructure
Externí odkaz:
https://doaj.org/article/4d7110b4dbad4e81bd5a576c8e2dcc8c
Autor:
Diana Pamela Moya Osorio, Ijaz Ahmad, Jose David Vega Sanchez, Andrei Gurtov, Johan Scholliers, Matti Kutila, Pawani Porambage
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 3, Pp 82-105 (2022)
The conceptualisation of the sixth generation of mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving the emergence of a number of innovative applications. Particularly, 6G w
Externí odkaz:
https://doaj.org/article/c65828bcd4c641edaac5258a5a0478d0
Autor:
Pawani Porambage, Gurkan Gur, Diana Pamela Moya Osorio, Madhusanka Liyanage, Andrei Gurtov, Mika Ylianttila
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 2, Pp 1094-1122 (2021)
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and pri
Externí odkaz:
https://doaj.org/article/6f6f9bf63c0047e482fa32efdb5e0db3
Autor:
Ijaz Ahmad, Shariar Shahabuddin, Hassan Malik, Erkki Harjula, Teemu Leppanen, Lauri Loven, Antti Anttonen, Ali Hassan Sodhro, Muhammad Mahtab Alam, Markku Juntti, Antti Yla-Jaaski, Thilo Sauter, Andrei Gurtov, Mika Ylianttila, Jukka Riekki
Publikováno v:
IEEE Access, Vol 8, Pp 223418-223460 (2020)
The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regar
Externí odkaz:
https://doaj.org/article/b8ac991212e542e99c213cae584c4baa
Publikováno v:
IEEE Access, Vol 7, Pp 155504-155512 (2019)
The search engine Shodan crawls the Internet for, among other things, Industrial Control Systems (ICS). ICS are devices used to operate and automate industrial processes. Due to the increasing popularity of the Internet, these devices are getting mor
Externí odkaz:
https://doaj.org/article/34b90c858d0c4eababe41319a2f59020
Publikováno v:
IEEE Access, Vol 3, Pp 967-984 (2015)
Virtual private LAN service (VPLS) is a Layer 2 virtual private network technique that has gained enormous popularity in industrial networks. However, the deployment of legacy VPLS architectures in large-scale networks is challenging due to unresolve
Externí odkaz:
https://doaj.org/article/a9d7ab597ebc4b1f88983b1f650399a6
Autor:
Pawani Porambage, An Braeken, Corinna Schmitt, Andrei Gurtov, Mika Ylianttila, Burkhard Stiller
Publikováno v:
IEEE Access, Vol 3, Pp 1503-1511 (2015)
Wireless sensor networks (WSNs) are a prominent fundamental technology of the Internet of Things (IoTs). Rather than device-to-device communications, group communications in the form of broadcasting and multicasting incur efficient message deliveries
Externí odkaz:
https://doaj.org/article/9bf726937e2741db84f533741301152c
Publikováno v:
Sensors, Vol 14, Iss 2, Pp 2732-2755 (2014)
Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors’ sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that
Externí odkaz:
https://doaj.org/article/66ab2d206e7c46bbb8c09202296d5f9f
Publikováno v:
Sensors, Vol 19, Iss 6, p 1339 (2019)
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for constrained networks and devices. CoAP and its extensions (e.g., CoAP observe and group communication) provide the potential for devel
Externí odkaz:
https://doaj.org/article/805f350aad7a4edab8bcf042a52370c2