Buscar
Mostrando ítems 1-10 de 5557
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
(2022-06-12)
Cybersecurity is a broadly defined concept comprising security for many different types of elements. Dealing with cybersecurity is a multidimensional problem, and the damage generated by cyberattacks can be very diverse. ...
An Agent-Based Approach for Data Fusion in Homeland Security
This article presents an agent-based solution for data fusion in Homeland Security. Communication technology has been developed very fast in the last decades. We can get lots of data in milliseconds. Our current problem ...
Comparing topics in CS syllabus with topics in CS research
(Association for Computing Machinery, 2016)
This study quantifies and compares the computer security themes found in the ACM Computer Science curricula with the themes addressed in top-ranked computer security re- search conferences over the past six years. On the ...
Novos métodos para prover segurança à comunicação no âmbito de redes elétricas inteligentes
(Universidade Federal de Santa MariaBrasilEngenharia ElétricaUFSMPrograma de Pós-Graduação em Engenharia ElétricaCentro de Tecnologia, 2018-03-23)
Information and communication technologies (ICT) incorporated into the power grid allows
the full implementation of the smart grids (SG) concept. Among the segments of the power
grid, providing this integration to energy ...
HAMSTER-healthy, mobility and security-based data communication architecture for unmanned aircraft systems
(2014-01-01)
Embedded systems are computer systems that are part of a larger system providing generally monitoring and real-time control for the entire system. They provide a set of pre-defined tasks, usually dedicated to a real time ...
HAMSTER - Healthy, Mobility and Security-based Data Communication Architecture for Unmanned Aircraft Systems
(Ieee, 2014-01-01)
Embedded systems are computer systems that are part of a larger system providing generally monitoring and real-time control for the entire system. They provide a set of pre-defined tasks, usually dedicated to a real time ...
Secure DNA data compression using algebraic curves
(IEEE, 2015)
A system that achieves compression using artificial DNA packaging with the support of two algebraic curves is presented, whereby the Hermitian channel code algorithm introduces gain and safety. Additionally, performance ...
Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts
Nowadays, blockchain is developing as a secure and trustworthy platform for secure information sharing in areas of application like banking, supply chain management, food industry, energy, the Internet, and medical services. ...