Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Stilianos Vidalis"'
Publikováno v:
Sensors, Vol 24, Iss 17, p 5465 (2024)
Smart security devices, such as smart locks, smart cameras, and smart intruder alarms are increasingly popular with users due to the enhanced convenience and new features that they offer. A significant part of this convenience is provided by the devi
Externí odkaz:
https://doaj.org/article/ec2523623e53401499031a622db0cfd0
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031311079
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8f5f18b0ca8df8a4a0a18f88ea004244
https://doi.org/10.1007/978-3-031-31108-6_15
https://doi.org/10.1007/978-3-031-31108-6_15
Publikováno v:
Multimedia tools and applications.
Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the vulnerability management practitioners of an organization in which the critical factor is the priorit
Publikováno v:
WIREs Forensic Science. 4
Autor:
Catherine Menon, Stilianos Vidalis
Publikováno v:
2021 International Carnahan Conference on Security Technology (ICCST).
Publikováno v:
Electronics, Vol 10, Iss 2365, p 2365 (2021)
Security is a mandatory issue in any network, where sensitive data are transferred safely in the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile areas for different applications. Whatever the application, the WS
Publikováno v:
Electronics, Vol 10, Iss 1849, p 1849 (2021)
Electronics
Volume 10
Issue 15
Electronics
Volume 10
Issue 15
Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an
Autor:
Andrew Jones, Stilianos Vidalis
Publikováno v:
Annals of Emerging Technologies in Computing, Vol 3, Iss 2, Pp 41-53 (2019)
In the modern socially-driven, knowledge-based virtual computing environment in which organisations are operating, the current digital forensics tools and practices can no longer meet the need for scientific rigour. There has been an exponential incr
Publikováno v:
Multimedia Tools and Applications. 77:16927-16946
Sensor networks designed especially for the multimedia applications require high data rate and better Quality of Service (QoS). Offering a reliable and energy efficient routing technique in a harsh and complex three-dimensional (3-D) environment for
Autor:
Olga Angelopoulou, Stilianos Vidalis
Publikováno v:
Information Security Journal: A Global Perspective. 22:151-158
In this paper we discuss Maneuver Warfare operations using cloud computing resources and how this can be utilized as part of a 21st century information security model used by the modern SME, operating at a national and international level. Proactive