Zobrazeno 1 - 10
of 101
pro vyhledávání: '"G. Voyiatzis"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Applied Horticulture. 19:175-179
Publikováno v:
Microprocessors and Microsystems. 54:75-82
The recent trend in a wide range of application domains, from the Internet of Things to space communications, is to deploy computing systems on FPGA devices. Modern FPGA technology encompasses billions of gates integrated in a single chip. In this se
Autor:
Georgios F. Tsanakas, Athanasios S. Economou, Thomas D. Syros, Demetrios G. Voyiatzis, Ourania Kasmeridou
Publikováno v:
Journal of Applied Horticulture. 18:207-212
Autor:
Athanasios Lioumpas, George Moldovan, Ralf C. Staudemeyer, Daniel Calvo, Artemios G. Voyiatzis, Santiago Reinhard Suppan
Publikováno v:
Human-Computer Interaction and Cybersecurity Handbook ISBN: 9781315184319
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aa87a19d0f2e14b7a65d395cfaeae478
https://doi.org/10.1201/b22142-11
https://doi.org/10.1201/b22142-11
Publikováno v:
Data and Applications Security and Privacy XXXII ISBN: 9783319957289
DBSec
DBSec
The Universal Serial Bus (USB) is becoming a prevalent attack vector. Rubber Ducky and BadUSB are two recent classes of a whole spectrum of attacks carried out using fully-automated keypress injections through innocent-looking USB devices. So far, de
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a312bb051c332bdb0f3ff2df15162ea3
https://doi.org/10.1007/978-3-319-95729-6_18
https://doi.org/10.1007/978-3-319-95729-6_18
Autor:
Nikolaos Kouvelas, Venkatraman Balasubramanian, R. V. Prasad, Kishor Chandra, Artemios G. Voyiatzis, William Liu
Publikováno v:
2018 IEEE 4th World Forum on Internet of Things (WF-IoT)
WF-IoT
WF-IoT
Recently, the edge resource provisioning schemes were defined considering the low-latency Mobile Edge Computing (MEC) paradigm. Most of these models only consider battery-powered devices like smart-phones, thus are agnostic to the energy harvesting t
Publikováno v:
Computer Aided Systems Theory – EUROCAST 2017 ISBN: 9783319747170
EUROCAST (1)
EUROCAST (1)
While the large scale distribution and unprecedented connectivity of embedded systems in the Internet of Things (IoT) has enabled various useful application scenarios, it also poses a risk to users and infrastructure alike. Recent incidents, like the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3150cdb4fbdb27bad73631c4ca7e4d48
https://doi.org/10.1007/978-3-319-74718-7_24
https://doi.org/10.1007/978-3-319-74718-7_24
Publikováno v:
ARES
The rapid deployment of IoT systems on the public Internet is not without concerns for the security and privacy of consumers. Security in IoT systems is often poorly engineered and engineering for privacy does notseemtobea concern for vendors at all.
Publikováno v:
ARES
Local-area networks comprising the Internet of Things (IoT) consist mainly of devices that have limited processing capabilities and face energy constraints. This has an implication on developing security mechanisms, as they require significant comput