Zobrazeno 1 - 10
of 912
pro vyhledávání: '"SECURITY OF DATA"'
Publikováno v:
IET Communications, Vol 18, Iss 20, Pp 1683-1715 (2024)
Abstract With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures hav
Externí odkaz:
https://doaj.org/article/5c2cc8f687aa40eca37c110f20b81005
Publikováno v:
IET Communications, Vol 18, Iss 20, Pp 1778-1794 (2024)
Abstract In recent days, the Internet of Vehicles (IoV) and its network of connected automobiles have revealed several new security risks. Classical intrusion detection systems face challenges in identifying intrusions due to the growing number of ve
Externí odkaz:
https://doaj.org/article/d28bed0be5714565a31f0446fc9bc5a5
Publikováno v:
IET Blockchain, Vol 4, Iss 4, Pp 344-354 (2024)
Abstract On‐chain sealed auctions represent a novel approach to electronic bidding auctions, wherein the introduction of zero‐knowledge proof technology has significantly enhanced the security of auctions. However, most mainstream on‐chain seal
Externí odkaz:
https://doaj.org/article/87487d4accea4cbb93038c0bf82a1b9d
Publikováno v:
IET Radar, Sonar & Navigation, Vol 18, Iss 10, Pp 1710-1723 (2024)
Abstract A distributed multiple‐input multiple‐output (MIMO) dual‐function radar‐communication (D‐MIMO DFRC) system is composed of multiple distributed dual‐function transmitters, multiple radar receivers and multiple communication receiv
Externí odkaz:
https://doaj.org/article/d05cecb1479a441eb0469f83b373aeb5
Publikováno v:
IET Communications, Vol 18, Iss 17, Pp 1107-1125 (2024)
Abstract In the era of industry 4.0 and the widespread use of digital devices, the number of cyber attacks poses an escalating and diverse threat, jeopardizing users' online activities. Intrusion detection systems (IDS) emerge as pivotal solutions, p
Externí odkaz:
https://doaj.org/article/3430b12fd5854ba782fa7d1e9a1a7fe5
Publikováno v:
IET Wireless Sensor Systems, Vol 14, Iss 5, Pp 181-194 (2024)
Abstract The 5G‐enabled sensor network systems make it possible to connect cyber and real ‘things’ in many ways. Even so, the flow of data between 5G‐enabled sensor devices brings big data environment problems, such as huge amounts of data, d
Externí odkaz:
https://doaj.org/article/07282bcc02eb4fccae9fd184d4df3d56
Publikováno v:
IET Wireless Sensor Systems, Vol 14, Iss 5, Pp 157-180 (2024)
Abstract Conventional infrastructures based on the cloud are not sufficient for the emerging Internet of Things (IoT) applications requirements. Many big problems are shortcomings, especially in terms of network bandwidth and latency. Throughout rece
Externí odkaz:
https://doaj.org/article/5461a20d74f542a08bde91669d1e8371
Autor:
Hongwei Li, Danai Chasaki
Publikováno v:
IET Cyber-Physical Systems, Vol 9, Iss 3, Pp 228-237 (2024)
Abstract Cyberattacks on cyber‐physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy
Externí odkaz:
https://doaj.org/article/0de73e3b24e84689b8bfcb553013722a
Publikováno v:
IET Image Processing, Vol 18, Iss 10, Pp 2800-2815 (2024)
Abstract Image hiding is a task that hides secret images into cover images. The purposes of image hiding are to ensure the secret images are invisible to the human and the secret images can be recovered. The current state‐of‐the‐art steganograp
Externí odkaz:
https://doaj.org/article/2d99afd03be0498e9b79560255f99022
Publikováno v:
IET Networks, Vol 13, Iss 4, Pp 313-323 (2024)
Abstract Cross‐site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking
Externí odkaz:
https://doaj.org/article/94a25da43daf4704b9d6bbe4aea2d64b