Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Nick Ayres"'
Publikováno v:
Internet of Things and Cyber-Physical Systems, Vol 3, Iss , Pp 1-13 (2023)
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and general implementation problems, pre
Externí odkaz:
https://doaj.org/article/3d5b61cbc46742df874f2bc527e4f818
Publikováno v:
Applied Sciences, Vol 11, Iss 19, p 9083 (2021)
It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated
Externí odkaz:
https://doaj.org/article/e45eb837564e44b3b5aa0b7fccae141c
Publikováno v:
2022 IEEE Symposium on Computers and Communications (ISCC).
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link. As we move from traditional power grids to smart grids, new threats both physical and digital arise. T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e33dd604367981e29a5bba8a4f54da9a
https://doi.org/10.1109/MC.2022.3184425
https://doi.org/10.1109/MC.2022.3184425
Publikováno v:
De Montfort University Open Research Archive
ORCID
ORCID
In this article we present our novel Secure Node End-2-End Encryption (SNE2EE) mechanism that is under implementation. This mechanism offers both a software and hardware solution by extending encryption technologies and techniques to the end nodes to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2842342c681a2a0a349be3738a2fca10
https://hdl.handle.net/2086/21726
https://hdl.handle.net/2086/21726
The IoT is recognized as one of the most important areas of future technology and is gaining vast attention from a wide range of industries. Although, after 20 years from the first published literature (2002) the technology (as a whole) is not yet ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8406f9fe47d94fa188cc2d5d9bf1cc97
The IoT is recognized as one of the most important areas of future technology and is gaining vast attention from a wide range of industries. Although, after 20 years from the first published literature (2002) the technology (as a whole) is not yet ma
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a6d97dc52a39f0aa871de841740c90dd
https://doi.org/10.20944/preprints202111.0214.v1
https://doi.org/10.20944/preprints202111.0214.v1
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware atta
Secure messaging is very important especially in critical applications like communication of automated cars. In this article we present a simulation of a blockchain messaging platform based on the Bitcoin protocol. The mechanism can be used for excha
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d9f20db95a28c47831620cbfe997b983
https://dora.dmu.ac.uk/handle/2086/21418
https://dora.dmu.ac.uk/handle/2086/21418
Publikováno v:
Applied Sciences, Vol 11, Iss 9083, p 9083 (2021)
Applied Sciences
Volume 11
Issue 19
Applied Sciences
Volume 11
Issue 19
open access article It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming