Zobrazeno 1 - 10
of 125
pro vyhledávání: '"Gregory Epiphaniou"'
Autor:
Alexandros Stavdas, Evangelos Kosmatos, Carsten Maple, Emilio Hugues‐Salas, Gregory Epiphaniou, Daniel S. Fowler, Shadi A. Razak, Chris Matrakidis, Hu Yuan, Andrew Lord
Publikováno v:
IET Quantum Communication, Vol 5, Iss 1, Pp 38-45 (2024)
Abstract The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience and the potential to enhance road safety and reduce environmental impact. This will be utilising highly diverse traffic environments tha
Externí odkaz:
https://doaj.org/article/760e369b683f416fb09e62f59c842c29
Publikováno v:
Digital Health, Vol 10 (2024)
Objective Establish a relationship between digital health intervention (DHI) and health system challenges (HSCs), as defined by the World Health Organization; within the context of hazard identification (HazID), leading to safety claims. To improve t
Externí odkaz:
https://doaj.org/article/4aafdeb543df4304bbac825001c02091
Autor:
Nasser Alhammad, Mohannad Alajlani, Alaa Abd-alrazaq, Gregory Epiphaniou, Theodoros Arvanitis
Publikováno v:
Journal of Medical Internet Research, Vol 26, p e50715 (2024)
BackgroundMobile health (mHealth) apps have the potential to enhance health care service delivery. However, concerns regarding patients’ confidentiality, privacy, and security consistently affect the adoption of mHealth apps. Despite this, no revie
Externí odkaz:
https://doaj.org/article/8a89b58e77734039b85a0c624d8c52dc
Autor:
Nasser Alhammad, Mohannad Alajlani, Alaa Abd-alrazaq, Theodoros Arvanitis, Gregory Epiphaniou
Publikováno v:
JMIR Research Protocols, Vol 13, p e54933 (2024)
BackgroundThere is data paucity regarding users’ awareness of privacy concerns and the resulting impact on the acceptance of mobile health (mHealth) apps, especially in the Saudi context. Such information is pertinent in addressing users’ needs i
Externí odkaz:
https://doaj.org/article/bc5abdbfa96b4a4dbe3a1606ce1cf34f
Publikováno v:
IET Quantum Communication, Vol 4, Iss 4, Pp 191-199 (2023)
Abstract Quantum‐based technologies will provide system engineers with new capabilities for securing data communications. The UK AirQKD project has implemented a Free‐Space Optical Quantum Key Distribution (QKD) system to enable the continuous ge
Externí odkaz:
https://doaj.org/article/d802d0554f284dcea5c764c622d2ff25
Publikováno v:
Vehicles, Vol 5, Iss 4, Pp 1586-1604 (2023)
We provide a practical implementation of a free space optical quantum key distribution (FSO-QKD) system within a vehicle-to-infrastructure (V2I) application developed under the Innovate UK AirQKD project. The FSO-QKD system provides the quantum secur
Externí odkaz:
https://doaj.org/article/119b118bb786487f8de102f7675e3446
Publikováno v:
Journal of Information Security and Cybercrimes Research, Vol 5, Iss 2, Pp 91-103 (2022)
The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices wit
Externí odkaz:
https://doaj.org/article/29834efeb1e6409f8843b84eb90192d6
Publikováno v:
Sensors, Vol 24, Iss 1, p 241 (2023)
As threat vectors and adversarial capabilities evolve, Cloud-Assisted Connected and Autonomous Vehicles (CCAVs) are becoming more vulnerable to cyberattacks. Several established threat analysis and risk assessment (TARA) methodologies are publicly av
Externí odkaz:
https://doaj.org/article/f324992a279343e8b84b28e757a1fe25
Publikováno v:
Information, Vol 15, Iss 1, p 14 (2023)
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Althoug
Externí odkaz:
https://doaj.org/article/b7f80f143324469b976749ca1ce202d4
Publikováno v:
Sensors, Vol 23, Iss 21, p 8720 (2023)
Cyber threats and vulnerabilities present an increasing risk to the safe and frictionless execution of business operations. Bad actors (“hackers”), including state actors, are increasingly targeting the operational technologies (OTs) and industri
Externí odkaz:
https://doaj.org/article/9f11f73b2a94433690f142aca534455b