Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Assessment of the Security Threats of an Institution’s Virtual Online Resources

    Web application is no denying one of the most effective ways to provide essential services to clientele. However, data breach and system insecurities are increasing concern in the field of information system. ...

    Daisy Endencio-Robles, Rosslin John Robles in Machine Intelligence and Soft Computing (2021)

  2. No Access

    Book and Conference Proceedings

    Advanced Computer Science and Information Technology

    Third International Conference, AST 2011, Seoul, Korea, September 27-29, 2011. Proceedings

    Tai-hoon Kim, Hojjat Adeli in Communications in Computer and Information Science (2011)

  3. No Access

    Book and Conference Proceedings

    Information Security and Assurance

    International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings

    Tai-hoon Kim, Hojjat Adeli in Communications in Computer and Information Science (2011)

  4. No Access

    Book and Conference Proceedings

    Ubiquitous Computing and Multimedia Applications

    Second International Conference, UCMA 2011, Daejeon, Korea, April 13-15, 2011. Proceedings, Part II

    Tai-hoon Kim, Hojjat Adeli in Communications in Computer and Information Science (2011)

  5. No Access

    Book and Conference Proceedings

    Advanced Communication and Networking

    Third International Conference, ACN 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings

    Tai-hoon Kim, Hojjat Adeli in Communications in Computer and Information Science (2011)

  6. No Access

    Book and Conference Proceedings

    Ubiquitous Computing and Multimedia Applications

    Second International Conference, UCMA 2011, Daejeon, Korea, April 13-15, 2011. Proceedings, Part I

    Tai-hoon Kim, Hojjat Adeli in Communications in Computer and Information Science (2011)

  7. No Access

    Chapter and Conference Paper

    Security Encryption Schemes for Internet SCADA: Comparison of the Solutions

    SCADA has now expanded as it utilizes the Internet as communication line. SCADA communications can contain sensitive data, it is also a core component of a SCADA Monitoring System. SCADA (Supervisory Control a...

    Rosslin John Robles, Maricel Balitanas in Security-Enriched Urban Computing and Smar… (2011)

  8. No Access

    Chapter and Conference Paper

    A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks

    Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections. MIPv6 allows a mobile node to transparently maintain connections while moving from o...

    Sunguk Lee, Taeheon Kang, Rosslin John Robles, Sung-Gyu Kim in Security Technology (2011)

  9. No Access

    Chapter and Conference Paper

    Application Program Interface as Back-Up Data Source for SCADA Systems

    Internet SCADA was developed to widen the coverage span of the SCADA system. In this section, a double checking scheme for Internet SCADA Environment is analyzed. This is to improve the accuracy of data and to...

    Rosslin John Robles, Tai-hoon Kim in Information Security and Assurance (2011)

  10. No Access

    Chapter and Conference Paper

    Securing Communication between SCADA Master Station and Mobile Remote Components

    Conventional SCADA communications has been fixed Point-to-Multipoint serial communications over lease line or private radio systems. Mobility of Remote Components can widen the coverage and can make SCADA more...

    Rosslin John Robles, Gil-Cheol Park in Information Security and Assurance (2011)

  11. No Access

    Chapter and Conference Paper

    Retrofit to CAIN Issues for Critical Infrastructures

    There is an increasing concern among both government officials and control systems experts about potential cyber threats to the control systems that govern critical infrastructures. The industrial control and ...

    Maricel O. Balitanas, Rosslin John Robles in Security-Enriched Urban Computing and Smar… (2011)

  12. No Access

    Chapter and Conference Paper

    Internet SCADA Utilizing API’s as Data Source

    An Application programming interface or API is an interface implemented by a software program that enables it to interact with other software. Many companies provide free API services which can be utilized in ...

    Rosslin John Robles, Haeng-kon Kim in Security Technology, Disaster Recovery and… (2010)

  13. No Access

    Chapter and Conference Paper

    Communication Security for Control Systems in Smart Grid

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex,...

    Rosslin John Robles, Tai-hoon Kim in Security Technology, Disaster Recovery and… (2010)

  14. No Access

    Chapter and Conference Paper

    Context Aware Systems, Methods and Trends in Smart Home Technology

    Context aware applications respond and adapt to changes in the computing environment. It is the concept of leveraging information about the end user to improve the quality of the interaction. New technologies ...

    Rosslin John Robles, Tai-hoon Kim in Security-Enriched Urban Computing and Smart Grid (2010)

  15. No Access

    Chapter and Conference Paper

    Feature Extraction and Analysis of Breast Cancer Specimen

    In this paper, we propose a method to identify abnormal growth of cells in breast tissue and suggest further pathological test, if necessary. We compare normal breast tissue with malignant invasive breast tiss...

    Debnath Bhattacharyya, Rosslin John Robles in Advanced Communication and Networking (2010)

  16. No Access

    Chapter and Conference Paper

    Model Based User’s Access Requirement Analysis of E-Governance Systems

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to p...

    Shilpi Saha, Seung-Hwan Jeon in Security-Enriched Urban Computing and Smar… (2010)

  17. No Access

    Chapter and Conference Paper

    An Encryption Scheme for Communication Internet SCADA Components

    The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is consider...

    Rosslin John Robles, Tai-hoon Kim in Advanced Computer Science and Information Technology (2010)

  18. No Access

    Chapter and Conference Paper

    Security Encryption Scheme for Communication of Web Based Control Systems

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Tradit...

    Rosslin John Robles, Tai-hoon Kim in Signal Processing and Multimedia (2010)

  19. No Access

    Chapter and Conference Paper

    Symmetric-Key Encryption for Wireless Internet SCADA

    Traditionally SCADA is connected only in a limited private network. With new technology and facilities, there are also demands of connecting SCADA though the internet. The internet SCADA facility has brought a...

    Rosslin John Robles, Min-Kyu Choi in Security Technology (2009)