-
1
Physical layer security analysis using radio frequency‐fingerprinting in cellular‐V2X for 6G communication
Published 2023-05-01Subjects: Get full text
Article -
2
Invulnerability invariants for software controlled speculation
Published 2024-12-01Subjects: Get full text
Article -
3
On the security of ‘an ultra‐lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex‐M microcontroller’
Published 2023-05-01Subjects: “…security of data…”
Get full text
Article -
4
-
5
Security Vision of 5G
Published 2014-11-01Subjects: “…5G security;big data;NFV/SDN…”
Get full text
Article -
6
A literature review on V2X communications security: Foundation, solutions, status, and future
Published 2024-12-01Subjects: Get full text
Article -
7
Preventing face morphing attacks by using legacy face images
Published 2021-07-01Subjects: Get full text
Article -
8
The practice and prospect of data factor circulation and security governance in civil aviation field
Published 2024-11-01Subjects: “…data security governance;data standard;data architecture;classification…”
Get full text
Article -
9
A survey on detection and localisation of false data injection attacks in smart grids
Published 2024-12-01Subjects: Get full text
Article -
10
Flexible and high‐throughput structures of Camellia block cipher for security of the Internet of Things
Published 2021-05-01Subjects: Get full text
Article -
11
Continuous improvement on maturity and capability of Security Operation Centres
Published 2021-01-01Subjects: Get full text
Article -
12
Applying usability recommendations when developing mobile instant messaging applications
Published 2022-02-01Subjects: Get full text
Article -
13
Using assurance frameworks to manage the risks and uncertainties of an energy sector digital spine
Published 2024-12-01Subjects: Get full text
Article -
14
Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists
Published 2023-07-01Subjects: Get full text
Article -
15
zk‐STARKs based scheme for sealed auctions in chains
Published 2024-12-01Subjects: Get full text
Article -
16
Energy‐efficient multi‐biometric system for Internet of Things using trust management
Published 2021-11-01Subjects: Get full text
Article -
17
Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ
Published 2024-12-01Subjects: “…Higher Education Application Security; Personal Data Protection; Security Vulnerability; Action Research Methodology.…”
Get full text
Article -
18
Design of an efficient dynamic context‐based privacy policy deployment model via dual bioinspired Q learning optimisations
Published 2024-12-01Subjects: Get full text
Article -
19
Research on the national defense cyber security and data governance
Published 2024-05-01Subjects: “…national defense authorization act;national defense cyber security;national data strategy;governance of critical data…”
Get full text
Article -
20
Cross-modal Aggregation Algorithm for Multi Source HeterogeneousData of Power Distribution Terminal
Published 2021-01-01Subjects: Get full text
Article