Showing 4,881 - 4,890 results of 4,890 for search '"Cybersecurity"', query time: 0.14s Refine Results
  1. 4881
  2. 4882

    Innovating for Sustainable Development by Ruki Harwahyu, Muhamad Asvial, Muhammad Suryanegara, Eny Kusrini, Muhamad Sahlan, Paramita Atmodiwirjo, Yandi Andri Yatmo, Isti Surjandari, Teuku Yuri M Zagloel

    Published 2022-11-01
    “…Coexistence with nature is important for our sustainable future.The manuscript written by Soo-Chin Tan and Swee-Huay Heng is focusing on the cybersecurity aspect of an electronic system. As many activities in our live are intertwined with digital system, data security is important. …”
    Get full text
    Article
  3. 4883

    Command Injection Attacks in Smart Grids: A Survey by Muhammad Usama, Muhammad Naveed Aman

    Published 2024-01-01
    “…Cybersecurity is important in the realization of various smart grid technologies. …”
    Get full text
    Article
  4. 4884

    Security risk assessment in Internet of Things systems by Nurse, J, Creese, S, De Roure, D

    Published 2017
    “…Cybersecurity risk assessment approaches have served us well over the last decade. …”
    Journal article
  5. 4885

    Performance Impact of Header-Based Network Steganographic Countermeasures by Robert Flowers

    Published 2022-01-01
    “…Cybersecurity executives, engineers, and decision-makers should not presume effective network steganographic countermeasures come at the cost of performance. …”
    Get full text
    Article
  6. 4886

    Towards Resilient Cyber-Physical Energy Systems by Baros, Stefanos, Shiltz, Dylan, Jaipuria, Prateek, Hussain, Alefiya, Annaswamy, Anuradha M.

    Published 2017
    “…DETERLab, a testbed capable of emulating high fidelity, cybersecure, net-worked systems, is used to construct critical scenarios with physical faults emulated in the form of generator outages and cyber faults emulated in the form of Denial of Service (DoS) attacks. …”
    Get full text
    Article
  7. 4887

    Data-Driven Network Analysis for Anomaly Traffic Detection by Shumon Alam, Yasin Alam, Suxia Cui, Cajetan Akujuobi

    Published 2023-09-01
    “…Cybersecurity is a critical issue in today’s internet world. …”
    Get full text
    Article
  8. 4888

    Enabling the Internet of Mobile Crowdsourcing Health Things: A Mobile Fog Computing, Blockchain and IoT Based Continuous Glucose Monitoring System for Diabetes Mellitus Research an... by Tiago M. Fernández-Caramés, Iván Froiz-Míguez, Oscar Blanco-Novoa, Paula Fraga-Lamas

    Published 2019-07-01
    “…Moreover, in order to exchange reliable, trustworthy and cybersecure data with medical scientists, doctors and caretakers, the system includes the deployment of a decentralized storage system that receives, processes and stores the collected data. …”
    Get full text
    Article
  9. 4889

    Decentralized Autonomous Organizations as the New Form of Economic Cooperation in Digital World by Denys VIROVETS, Sergiy OBUSHNYI

    Published 2020-12-01
    “…Also we believe that DAO should become a separate economic system based on the idea of Seconomics end Robonomics, where the digital economy is seen as an integral part of CyberSecurity.…”
    Get full text
    Article
  10. 4890

    Transactive Demand Response Operation at the Grid Edge using the IEEE 2030.5 Standard by Javad Fattahi, Mikhak Samadi, Melike Erol-Kantarci, Henry Schriemer

    Published 2020-07-01
    “…A complete laboratory-based implementation provides the first (to our knowledge) realization of a comprehensive TDR use case that is fully compliant with the Institute of Electrical and Electronics Engineers (IEEE) 2030.5 standard, which addresses interoperability within a cybersecure smart energy profile (SEP) context. Verification is provided by a full system integration with commercial hardware using Internet Protocol (IP)-based (local area network (LAN) and Wi-Fi) communication protocols and transport layer security (TLS) 1.2 cryptographic protocol, and validation is provided by emulation using extensive residential smart meter data. …”
    Get full text
    Article