Zobrazeno 1 - 7
of 7
pro vyhledávání: '"R. D. Sparrow"'
Publikováno v:
ICSPCS
Tactical unmanned vehicles are commonly used to conduct tasks (e.g. monitor and surveillance) in various civilian applications from a remote location. The characteristic of the wireless communication link allows attackers to monitor and manipulate th
Publikováno v:
SysCon
Unmanned aerial vehicles (UAV) are commonly used to conduct tasks (e.g. monitor and surveillance) in various civilian applications from a remote location. Wireless communications (i.e. radio frequency) are often used to remotely pilot the UAV and str
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f8ff242fc1e3910f320f2f6df27aeae5
Publikováno v:
NGMAST
Unmanned control vehicles are used for a variety of scenarios where the user can conduct a task from a remote location; scenarios include surveillance, disaster recovery and agricultural farming. The operation of unmanned vehicles is generally conduc
Publikováno v:
CYBCONF
With the requirement for remote control of unmanned aerial vehicles (UAV) becoming more frequent in scenarios where the environment is inaccessible or hazardous to human beings (e.g. disaster recovery); remote functionality of a UAV is generally impl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3b154dccf6f51e9c3b8baf3ef466053d
http://gala.gre.ac.uk/id/eprint/14211/1/14211_Sparrow_Balancing_Throughput_and_Latency_(AAM)_2015.pdf
http://gala.gre.ac.uk/id/eprint/14211/1/14211_Sparrow_Balancing_Throughput_and_Latency_(AAM)_2015.pdf
Publikováno v:
2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
MIPRO
MIPRO
With the interconnection of devices becoming more widespread in society (e.g. internet of things), networked devices are used in a range of environments from smart grids to smart buildings. Wireless Sensor Networks (WSN) have commonly been utilised a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::99c3c9b45c56715214b128bd23906926
http://gala.gre.ac.uk/id/eprint/14210/4/14210_SPARROW_Study_of_Two_Security_Constructs_2015.pdf
http://gala.gre.ac.uk/id/eprint/14210/4/14210_SPARROW_Study_of_Two_Security_Constructs_2015.pdf
Publikováno v:
2014 6th Computer Science and Electronic Engineering Conference (CEEC).
Open loop control has commonly been used to conduct tasks for a range of Industrial Control Systems (ICS). ICS however, are susceptible to security exploits. A possible countermeasure to the active and passive attacks on ICS is to provide cryptograph
Closed loop control systems have been implemented to conduct a variety of tasks (e.g. manufacturing and automation). Industrial Control System (ICS) have been used to regulate a closed loop process; however, ICS are exposed to the same security vulne
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::98114238b0749b3746a1d3ccabc41f65
http://gala.gre.ac.uk/id/eprint/14208/4/14208_SPARROW_Closed_Loop_Control_2015.pdf
http://gala.gre.ac.uk/id/eprint/14208/4/14208_SPARROW_Closed_Loop_Control_2015.pdf