Buscar
Mostrando ítems 1-10 de 4494
Novos métodos para prover segurança à comunicação no âmbito de redes elétricas inteligentes
(Universidade Federal de Santa MariaBrasilEngenharia ElétricaUFSMPrograma de Pós-Graduação em Engenharia ElétricaCentro de Tecnologia, 2018-03-23)
Information and communication technologies (ICT) incorporated into the power grid allows
the full implementation of the smart grids (SG) concept. Among the segments of the power
grid, providing this integration to energy ...
5G Security Threat Assessment in Real Networks
(Sensors (Basel), 2021)
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, ...
HAMSTER-healthy, mobility and security-based data communication architecture for unmanned aircraft systems
(2014-01-01)
Embedded systems are computer systems that are part of a larger system providing generally monitoring and real-time control for the entire system. They provide a set of pre-defined tasks, usually dedicated to a real time ...
HAMSTER - Healthy, Mobility and Security-based Data Communication Architecture for Unmanned Aircraft Systems
(Ieee, 2014-01-01)
Embedded systems are computer systems that are part of a larger system providing generally monitoring and real-time control for the entire system. They provide a set of pre-defined tasks, usually dedicated to a real time ...
Protecting Touch: Authenticated App-To-Server channels for mobile devices using NFC tags
(2017-07-06)
Traditional authentication methods (e.g., password, PIN) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of Near Field Communication (NFC) on a broad range ...
Information Security Policy Compliance: Usefulness and Ease of Use
(Springer Link, 2023)
Various information security (IS) standards and frameworks have been proposed with the objective of safeguarding an organization’s information assets. The Information Security Policy (ISP) is one of the tools for managing ...
Impact of Wireless Energy Transfer Strategies on the Secrecy Performance of Untrustworthy Relay Networks
(2022-01-01)
This work investigates the secrecy outage performance of a dual-hop relaying network with an untrustworthy energy-constrained amplify-and-forward relay. A destination-based jamming technique is adopted in order to prevent ...
The HAMSTER Data Communication Architecture for Unmanned Aerial, Ground and Aquatic Systems
(Springer, 2016-12-01)
This paper presents HAMSTER, the HeAlthy, Mobility and Security based data communication archiTEctuRe. HAMSTER is designed for Unmanned Vehicles and addresses mainly three types of communications: machine-to-machine, ...
Secure Statistical QoS Provisioning for Machine-type Wireless Communication Networks
(Ieee, 2018-01-01)
This work assesses the performance of secure machine-type communication networks composed of a legitimate pair of devices communicating in the presence of an eavesdropper. We evaluate the impact of legitimate source's ...
Secure statistical QoS provisioning for machine-type wireless communication networks
(2018-07-20)
This work assesses the performance of secure machine-type communication networks composed of a legitimate pair of devices communicating in the presence of an eavesdropper. We evaluate the impact of legitimate source's ...