We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A formal security analysis of the fast authentication procedure based on the security context in 5G networks

    The security context, generally stored in the universal subscriber identity module card or the baseband chip, is the critical information applied by...

    Zhiwei Cui, Baojiang Cui, ... Junsong Fu in Soft Computing
    Article 10 January 2024
  2. Exploring the landscape of network security: a comparative analysis of attack detection strategies

    The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are...

    Article 05 May 2024
  3. Wireless 6G Cloud Communication Based Security Analysis Using Machine Learning in Internet of Medical Things (IoMT)

    In order to safeguard confidentiality of patient data, healthcare data should not be made available to unauthorized individuals. By 2030, the...

    Jicheng Chen, Yihan Xu, ... Rui Han in Wireless Personal Communications
    Article 15 May 2024
  4. Secrecy Capacity Analysis Using Nonlinear Transmissions for Physical Layer Security

    In this paper, physical layer security is investigated, which is characterized by utilizing the physical layer characteristics to achieve secure...

    Jieling Wang, Zhiqian Wang, ... Yejun Zhou in Wireless Personal Communications
    Article 01 May 2024
  5. EXERTv2: Exhaustive Integrity Analysis for Information Flow Security with FSM Integration

    Hardware information flow analysis detects security vulnerabilities resulting from microarchitectural design flaws, design-for-test/debug (DfT/D)...

    Jiaming Wu, Domenic Forte in Journal of Hardware and Systems Security
    Article 26 December 2023
  6. Web Security Analysis of Banking Websites

    Website security is the process of managing and securing a website from cyberattacks by taking essential measures. The main purpose of the paper is...
    Bhawna Sharma, Rahul Johari in Proceedings of Data Analytics and Management
    Conference paper 2024
  7. Machine Learning-Based Security Evaluation and Overhead Analysis of Logic Locking

    Piracy and overproduction of hardware intellectual properties are growing concerns for the semiconductor industry under the fabless paradigm....

    Yeganeh Aghamohammadi, Amin Rezaei in Journal of Hardware and Systems Security
    Article 22 January 2024
  8. IoT Data Stream Handling, Analysis, Communication and Security Issues: A Systematic Survey

    Massive data management or data stream handling has become a prominent study topic as a result of recent breakthroughs in the Internet of Things...

    Sanjay Patidar, Neetesh Kumar, Rajni **dal in Wireless Personal Communications
    Article 20 May 2024
  9. Analysis of security and privacy issues in wearables for minors

    The increased use of wearables in recent years has fostered a great technological development in this area, although without the appropriate...

    Jaime Fúster, Sonia Solera-Cotanilla, ... Gregorio Lopez in Wireless Networks
    Article Open access 08 March 2023
  10. Security Analysis of Drone Communication Methods

    The use of drones in various applications has increased significantly in recent years, including agriculture, transportation, and military...
    Conference paper 2024
  11. Smart Cities and Transportation Based Vehicle-To-Vehicle Communication and Cyber Security Analysis Using Machine Learning Model in 6G Network

    Increasing number of sensor-centric communication and computer equipment installed inside cars for various purposes, such as vehicle monitoring,...

    Shurui Kong, Kemeng Wang, ... Junjie Wang in Wireless Personal Communications
    Article 01 June 2024
  12. Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network

    Data security is based on the collection of data and storage without hacking from a third person has been proposed. While transmitting the data, the...

    Mohammad Alauthman, Hanan Aljuaid, ... Awais Khan Jumani in Mobile Networks and Applications
    Article 21 August 2023
  13. Threat analysis for space information network based on network security attributes: a review

    Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is...

    Xuesong Wu, Ye Du, ... Tianshuai Zheng in Complex & Intelligent Systems
    Article Open access 28 November 2022
  14. Computer network security and information security technology optimization by using Bayesian classification algorithm

    The naive Bayesian classification algorithm is known for its perfect theoretical system, clear and simple star structure, good adaptability and high...

    Article 24 June 2023
  15. Intelligent LSTM (iLSTM)-Security Model for HetIoT

    Distributed denial-of-service (DDoS) is the most recent lethal threat, and several industrial and academic researchers are concentrating on defending...

    Shalaka S. Mahadik, Pranav M. Pawar, ... Dnyaneshwar Mantri in Wireless Personal Communications
    Article 01 November 2023
  16. A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthesis, Analysis and a Novel Quantified Approach

    Internet of Things (IoT) applications are among the major trends of nowadays. Billions of connected devices are creating great business profits and...

    Sondes Ksibi, Faouzi Jaidi, Adel Bouhoula in Mobile Networks and Applications
    Article 29 September 2022
  17. Managing Pandemics in Airport Security Environments: A Comparative Analysis of Classic Airport Security and Smart Security Approaches

    This article conducts a comparative analysis of conventional and SMART security systems within airport environments, focusing particularly on their...
    Vlad Vizitiu, Raul Henning, Mihai Dragomir in Advances in Manufacturing IV
    Conference paper 2024
  18. Smart City IoT System Network Level Routing Analysis and Blockchain Security Based Implementation

    This paper demonstrates, network-level performance analysis and implementation of smart city Internet of Things (IoT) system with Infrastructure as a...

    Samuyelu Bommu, Aravind Kumar M, ... S. Kiran S in Journal of Electrical Engineering & Technology
    Article 10 October 2022
  19. Security assessment and improvement of building ethernet KNXnet/IP protocol

    KNXnet/IP is a KNX-building automation protocol that communicates through an IP network. It is mainly used in the field of smart home and building...

    Tao Feng, Bugang Zhang, ... Lu Zheng in Discover Applied Sciences
    Article Open access 23 March 2024
  20. Physical layer security analysis of IRS-based downlink and uplink NOMA networks

    In recent years, the development of intelligent reflecting surface (IRS) in wireless communications has enabled control of radio waves to reduce the...

    Si-Phu Le, Hong-Nhu Nguyen, ... Miroslav Voznak in EURASIP Journal on Wireless Communications and Networking
    Article Open access 11 October 2023
Did you find what you were looking for? Share feedback.