Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Jun Wen WONG"'
Publikováno v:
IEEE Internet of Things Journal. 9:20431-20443
Autor:
Haroon Basheer, Siddhant Dash, Jun Wen Wong, Xu Jia, Biplab Sikdar, Ashutosh Sancheti, Hoon Wei Lim, Muhammad Naveed Aman
Publikováno v:
IEEE Systems Journal. 16:789-800
Autor:
Muhammad Naveed Aman, Biplab Sikdar, Mohamed Haroon Basheer, Hoon Wei Lim, Jia Xu, Siddhant Dash, Jun Wen Wong
Publikováno v:
IEEE Internet of Things Journal. 7:7220-7233
The critical and sensitive nature of data that the Internet-of-Things (IoT) devices produce makes them an attractive target for cyber attacks. Among the various types of attacks, malware is becoming a major concern for the IoT device. This article pr
Publikováno v:
Computers & Security. 80:134-154
Many firewalls have been extending their security capabilities to support Supervisory Control and Data Acquisition (SCADA) systems or to protect the operations within industrial process control. A SCADA firewall usually needs to inspect deeper into t
Autor:
Thiam Oun TEH, Arwinder SINGH, Jalil ALI, Chee An NG, Xue Yinn NG, Jun Wen WONG, Sor Heoh SAW, Sing LEE
Publikováno v:
Walailak Journal of Science and Technology (WJST). 16:379-384
A dense plasma focus (DPF) machine, being a source of a powerful ion beam, can be useful in the modification of the surface properties of materials. Experimental investigations were carried out with a 3.3 kJ Mather-type DPF operating in nitrogen at a
Autor:
Huaqun Guo, Jun Wen Wong
Publikováno v:
APCC
This paper aims to address control device security issue with Metro systems. It would be devastating in the event that control devices are suffering from cyber attacks or physical attacks. Thus, in this paper, we present a cyber-physical authenticati
Publikováno v:
TENCON 2017 - 2017 IEEE Region 10 Conference.
This paper aims to address sensor security issue with an autonomous vehicle (AV). It would be devastating in the event that sensors are compromised. Thus, in this paper, we present a cyber-physical security approach to secure sensing inputs. We prese
Publikováno v:
International Journal of Information Security. 9:287-296
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computation and storage, our scheme is particularly suitable for the WSN environ
Publikováno v:
Computer Security – ESORICS 2016 ISBN: 9783319457437
ESORICS (1)
ESORICS (1)
Two-factor authentication is increasingly demanded in the Internet of Things (IoT), especially those deployed in the critical infrastructure. However, resource and operational constraints of typical IoT devices are the key impediment, especially when
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9af9d0dbcee9b9f22fc58aec6b869da5
https://doi.org/10.1007/978-3-319-45744-4_5
https://doi.org/10.1007/978-3-319-45744-4_5
Autor:
Thiam Oun TEH, SINGH, Arwinder, ALI, Jalil, Chee An NG, Xue Yinn NG, Jun Wen WONG, Sor Heoh SAW, Sing LEE
Publikováno v:
Walailak Journal of Science & Technology; 2019, Vol. 16 Issue 6, p379-384, 6p