Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Jianjing Shen"'
Publikováno v:
IEEE Access, Vol 7, Pp 14171-14185 (2019)
The security situation of the Internet of Things (IoT) is more serious than ever, and there is an urgent need to detect and patch device vulnerability rapidly. With the astronomical numbers of IoT devices, it is very difficult to execute regular secu
Externí odkaz:
https://doaj.org/article/b06f9123a4f34fb38e866c9a15e3ba67
Publikováno v:
Intelligent Automation & Soft Computing. 26:1429-1440
Publikováno v:
Proceedings of 2021 Chinese Intelligent Automation Conference ISBN: 9789811663710
Based on the analysis of the key factors involved in the situation information recommendation, this paper integrates the situation information into the traditional “user-item” recommendation system, and constructs a multi-dimensional and multi-le
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b846d48a7f50fa5ecab8479ea166fdb3
https://doi.org/10.1007/978-981-16-6372-7_3
https://doi.org/10.1007/978-981-16-6372-7_3
Publikováno v:
IEEE Access, Vol 7, Pp 14171-14185 (2019)
The security situation of the Internet of Things (IoT) is more serious than ever, and there is an urgent need to detect and patch device vulnerability rapidly. With the astronomical numbers of IoT devices, it is very difficult to execute regular secu
Publikováno v:
2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE).
RFID technology is the core technology of the perception layer of the Internet of Things, which can realize the real-time transmission of information between objects without manual operation. However, information is transmitted through wireless chann
Publikováno v:
2020 Chinese Control And Decision Conference (CCDC).
Under the condition of information war, massive battlefield information data and rapidly changing battlefield situation require us to improve the speed and accuracy of command and decision-making, so as to get ahead of the enemy and gain the superior
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030578800
ICAIS (2)
ICAIS (2)
With the application domain extension and the in-depth research on physical unclonable function, the security of PUF has attracted more and more attention. Various attack methods have been emerged, among which side channel attacks have advantages in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::edd80e3bab6d2f8878f2ce8066998788
https://doi.org/10.1007/978-3-030-57881-7_7
https://doi.org/10.1007/978-3-030-57881-7_7
Publikováno v:
Intelligent Automation & Soft Computing; 2021, Vol. 27 Issue 1, p127-141, 15p
Publikováno v:
DEStech Transactions on Computer Science and Engineering.
With the widespread application of embedded devices, embedded software vulnerabilities and oriented attacks to embedded system are also rising. As being wellknown, the hardware architecture of the embedded devices is heterogeneous, and the software s
Publikováno v:
MATEC Web of Conferences, Vol 100, p 05068 (2017)
Security has always been the top issue against the cloud computing, scientific security architecture is the foundation of other security technologies. Comparing existed cloud computing security architectures and traditional security architectures, th