Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Peter Kanuch"'
Publikováno v:
Evolutionary Ecology. 37:509-530
Publikováno v:
2022 International Symposium ELMAR.
Publikováno v:
2022 45th International Conference on Telecommunications and Signal Processing (TSP).
Publikováno v:
2021 19th International Conference on Emerging eLearning Technologies and Applications (ICETA).
Autor:
Adam Gajdosik, Peter Kanuch
Publikováno v:
TSP
Internet of Things is made of many common devices, such as televisions, sensors, cars, and many others, which are connected. The greater number of devices, the greater possibility of being attacked by hackers, whose aim is to harm other users. Their
Autor:
Anton Krištín, Peter Kanuch
Publikováno v:
Entomologica Fennica. 20:207-214
Altitudinal preferences, somatic and population adaptations in different ecological conditions were analysed in flightless bush-cricket species Polysarcus denticauda (Charpentier, 1825). Altitudinal analysis was performed in GIS software (more than 6
Publikováno v:
2020 18th International Conference on Emerging eLearning Technologies and Applications (ICETA).
A huge amount of cybersecurity attacks discovered in recent years, moreover in the last one associated with the pandemic situation, where intruders are trying to exploit the hospitals and research centers. It can be dangerous as nowadays a lot of IoT
Publikováno v:
TSP
Nowadays, more and more devices are connected to the Internet labeled as the Internet of Things (IoT). They are used everywhere and anytime to improve our everyday life and make processes easier. In our work, we specify the term of IoT for better und
Publikováno v:
Biologia. 72:548-553
Mass hibernacula of several tens of thousands of Pipistrellus pipistrellus associated with the swarming of bats during seasonal movements should serve as important sites of gene flow in this species. The massive occurrence of hibernating bats which i
Autor:
Dominik Macko, Peter Kanuch
Publikováno v:
TSP
The research in the area of Internet-of-Things (IoT) security is still underway due to the growing IoT networks. The main goal of the existing works, optimizing security protocols, is to make them more efficient in order to reduce their energy requir