Zobrazeno 1 - 10
of 114
pro vyhledávání: '"Giorgio Ventre"'
Publikováno v:
ICT Express, Vol 10, Iss 3, Pp 519-552 (2024)
While the spreading of the Internet of Things continues beyond expectations, the security of networking technologies used in this context remains an open issue. This paper provides a comprehensive overview of the state of the art on the security of L
Externí odkaz:
https://doaj.org/article/e03cd0208ace49c6ac7135a76aa32eb1
Publikováno v:
Intelligent Systems with Applications, Vol 18, Iss , Pp 200237- (2023)
The use of robots in the modern world is widespread, not only in medicine and automated vehicles, but also in national security, defense, and industry. Together with the growing number of robots there is also an increase of cyber attacks against robo
Externí odkaz:
https://doaj.org/article/4855802de89042b98ffdf3a56ed1d809
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 10, Iss 2, p 34 (2021)
With the advances in networking technologies, robots can use the almost unlimited resources of large data centers, overcoming the severe limitations imposed by onboard resources: this is the vision of Cloud Robotics. In this context, we present DewRO
Externí odkaz:
https://doaj.org/article/529ac9e88c604706996c12fd94144334
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
Journal of Sensor and Actuator Networks
Volume 10
Issue 2
Journal of Sensor and Actuator Networks, Vol 10, Iss 34, p 34 (2021)
Volume 10
Issue 2
Journal of Sensor and Actuator Networks, Vol 10, Iss 34, p 34 (2021)
With the advances in networking technologies, robots can use the almost unlimited resources of large data centers, overcoming the severe limitations imposed by onboard resources: this is the vision of Cloud Robotics. In this context, we present DewRO
Publikováno v:
ICC
Available bandwidth is a vital parameter for understanding network status. A huge number of tools have been proposed in literature, including general ones as well as tools specialized for specific network scenarios. In this plethora of possibilities,
Publikováno v:
Computers & Security
The email threat landscape is constantly evolving and hence difficult to counteract even by carrier-grade spam filters. Dangerous spam emails may thus reach the users and then result in damaging attacks spreading through the corporate network. This p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::af00a3e07c9f6490476b06fda199a681
https://hdl.handle.net/11588/909869
https://hdl.handle.net/11588/909869
Publikováno v:
2020 IEEE 25th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
CAMAD
CAMAD
The emergency related to the Coronavirus has impacted everyone’s life. From the first weeks of 2020, in China, and for weeks later, in other countries of the world, isolation and social distancing measures have been adopted to avoid the spread of t
Publikováno v:
SOSE
The past few years have witnessed many software companies refactoring their monolithic applications into microservices to take advantage of containers in Cloud-native and DevOps-driven environments. Modern Cloud environments achieve high levels of sc
Publikováno v:
MobileCloud
In recent years Cloud Robotics technology has been proposed to overcome the constraints imposed by the resources of standalone robots. We can imagine that in near future robots will be very present in everyday life and interact with humans, so it is