Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Naeem Firdous Syed"'
Publikováno v:
IEEE Access, Vol 10, Pp 57143-57179 (2022)
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space. The article employs a descriptive approach to present the fundamental tenets of ZT and
Externí odkaz:
https://doaj.org/article/431390b698d84859b2c2979ee732804d
Publikováno v:
Journal of Information and Telecommunication, Vol 4, Iss 4, Pp 482-503 (2020)
Sustained Internet of Things (IoT) deployment and functioning are heavily reliant on the use of effective data communication protocols. In the IoT landscape, the publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is popular.
Externí odkaz:
https://doaj.org/article/db94d70ffd0845f181d9c17ae1f61e6e
Publikováno v:
Computer Networks. 225:109662
Publikováno v:
Journal of Information and Telecommunication, Vol 4, Iss 4, Pp 482-503 (2020)
Sustained Internet of Things (IoT) deployment and functioning are heavily reliant on the use of effective data communication protocols. In the IoT landscape, the publish/subscribe-based Message Queuing Telemetry Transport (MQTT) protocol is popular.
Publikováno v:
Future Internet; Volume 14; Issue 7; Pages: 205
Drones are increasingly adopted to serve a smart city through their ability to render quick and adaptive services. They are also known as unmanned aerial vehicles (UAVs) and are deployed to conduct area surveillance, monitor road networks for traffic
Deep learning (DL) techniques are being widely researched for their effectiveness in detecting cyber intrusions against the Internet of Things (IoT). However, time sensitive Critical Infrastructures (CIs) that rely on IoT require quicker detection of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8550c91a8052406a3d7de9a0a9d11e3c
https://doi.org/10.36227/techrxiv.13525409
https://doi.org/10.36227/techrxiv.13525409
Publikováno v:
Computers & Security. 112:102536
Digital technologies are increasingly being adopted in modern supply chains for product traceability, enabling data sharing amongst trading partners, quick availability of product data, and end-to-end visibility of products. This adoption increases t
Publikováno v:
TrustCom
Continuous Authentication (CA) has been proposed as a potential solution to counter complex cybersecurity attacks that exploit conventional static authentication mechanisms that authenticate users only at an ingress point. However, widely researched
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::76bf6a978a0c8845669a6463e429fc16
Publikováno v:
PRDC
Internet of Things (IoT) has an immense potential for a plethora of applications ranging from healthcare automation to defence networks and the power grid. The security of an IoT network is essentially paramount to the security of the underlying comp
Autor:
Patryk Szewczyk, Naeem Firdous Syed, Craig Valli, Zubair A. Baig, Krishnun Sansurooah, Ahmed Ibrahim, Peter Hannay, Michael N. Johnstone, Matthew Peacock, Paresh Kerai, Priya Rabadia, Maxim Chernyshev
Publikováno v:
Digital Investigation. 22:3-13
Smart cities are comprised of diverse and interconnected components constantly exchanging data and facilitating improved living for a nation's population. Our view of a typical smart city consists of four key components, namely, Smart Grids, Building