Zobrazeno 1 - 10
of 129
pro vyhledávání: '"Hein S. Venter"'
Publikováno v:
Applied Sciences, Vol 12, Iss 2, p 730 (2022)
Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the organization’s Information Te
Externí odkaz:
https://doaj.org/article/d48129c4aa1c40208424ef8c7eda13ec
Publikováno v:
IEEE Access, Vol 6, Pp 9303-9323 (2018)
In past years, cryptography has been considered a difficult task to achieve on sensor nodes for the Internet of Energy (IoE) owing to the resource-constrained nature of 8and 16-bit microcontroller units (MCUs). Previous attempts at implementing crypt
Externí odkaz:
https://doaj.org/article/e4a2ceb83b884c86bf334ae432e5d871
Publikováno v:
International Transactions in Operational Research. 29:372-395
Publikováno v:
PLoS ONE, Vol 11, Iss 12, p e0166930 (2016)
Comprehension of the statistical and structural mechanisms governing human dynamics in online interaction plays a pivotal role in online user identification, online profile development, and recommender systems. However, building a characteristic mode
Externí odkaz:
https://doaj.org/article/fd459e90675f4a9c80af75e49076e340
Publikováno v:
Australian Journal of Forensic Sciences. 53:566-591
Currently, about half of all global enterprises are adopting and using some form of cloud computing services. In cloud computing, potential digital evidence is distributed across multiple isolated ...
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783031063732
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::17fa9d1efcb1ca14fc63187e853e4734
https://doi.org/10.1007/978-3-031-06374-9_21
https://doi.org/10.1007/978-3-031-06374-9_21
Publikováno v:
Computers in Biology and Medicine. 149:105943
The task of classification and localization with detecting abnormalities in medical images is considered very challenging. Computer-aided systems have been widely employed to address this issue, and the proliferation of deep learning network architec
Publikováno v:
Digital Investigation. 30:73-89
the need for a reliable and complementary identifier mechanism in a digital forensic analysis is the focus of this study. Mouse dynamics have been applied in information security studies, particularly, continuous authentication and authorization. How
Autor:
Victor R. Kebande, Hein S. Venter
Publikováno v:
African Journal of Science, Technology, Innovation and Development. 11:749-769
The proliferation of cloud resources among organizations has had numerous benefits with regard to how business processes are conducted. However, despite the benefits, the cloud has not been very resilient due to how it is distributed and its open nat
Publikováno v:
Electronics
Volume 10
Issue 6
Electronics, Vol 10, Iss 714, p 714 (2021)
Volume 10
Issue 6
Electronics, Vol 10, Iss 714, p 714 (2021)
The increasing strain on ageing generation infrastructure has seen more frequent instances of scheduled and unscheduled blackouts, rising reliability on fossil fuel based energy alternatives and a slow down in efforts towards achieving universal acce