Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 99
1.
  • An unsupervised method for ... An unsupervised method for social network spammer detection based on user information interests
    Koggalahewa, Darshika; Xu, Yue; Foo, Ernest Journal of big data, 01/2022, Volume: 9, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Online Social Networks (OSNs) are a popular platform for communication and collaboration. Spammers are highly active in OSNs. Uncovering spammers has become one of the most challenging problems in ...
Full text
Available for: CEKLJ, NUK, ODKLJ, UL, UM, UPUK

PDF
2.
  • Machine Learning to Optimiz... Machine Learning to Optimize TCP Communications Over High Frequency Communications Links
    Dmello, Alvin; Jayalath, Dhammika; Foo, Ernest ... IEEE access, 2022, Volume: 10
    Journal Article
    Peer reviewed
    Open access

    High Frequency communication is a proven method of beyond line of sight (BLOS) communications for decades. With the advent of Wideband HF (WBHF), the ability to communicate data and more specifically ...
Full text
Available for: NUK, UL, UM, UPUK
3.
  • Authentication strategies i... Authentication strategies in vehicular communications: a taxonomy and framework
    Rezazadeh Baee, Mir Ali; Simpson, Leonie; Boyen, Xavier ... EURASIP journal on wireless communications and networking, 05/2021, Volume: 2021, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems known as Vehicular Communication (VC) ...
Full text
Available for: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK

PDF
4.
  • Anomaly Detection for Insid... Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems
    Wang, Xuelei; Fidge, Colin; Nourbakhsh, Ghavameddin ... IEEE access, 2022, Volume: 10
    Journal Article
    Peer reviewed
    Open access

    In recent decades, cyber security issues in IEC 61850-compliant substation automation systems (SASs) have become growing concerns. Many researchers have developed various strategies to detect ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
5.
  • A Design for a Secure Energ... A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market
    Tesfamicael, Aklilu Daniel; Liu, Vicky; McKague, Matthew ... IEEE access, 01/2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    Energy market trading systems are undergoing rapid transformation due to an increasing demand for renewable energy sources to be integrated into the power grid, coupled with the dynamic and evolving ...
Full text
Available for: NUK, UL, UM, UPUK

PDF
6.
  • The Security of "2FLIP" Aut... The Security of "2FLIP" Authentication Scheme for VANETs: Attacks and Rectifications
    Baee, Mir Ali Rezazadeh; Simpson, Leonie; Foo, Ernest ... IEEE open journal of vehicular technology, 2023, Volume: 4
    Journal Article
    Peer reviewed
    Open access

    Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles and with nearby fixed equipment, referred to as Road Side Units (RSUs). The ...
Full text
Available for: NUK, UL, UM, UPUK
7.
  • Software Vulnerability Dete... Software Vulnerability Detection Using Informed Code Graph Pruning
    Gear, Joseph; Xu, Yue; Foo, Ernest ... IEEE access, 2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    pruning methods that can be used to reduce graph size to manageable levels by removing information irrelevant to vulnerabilities, while preserving relevant information. We present "Semantic-enhanced ...
Full text
Available for: NUK, UL, UM, UPUK
8.
  • Anomaly detection for indus... Anomaly detection for industrial control systems using process mining
    Myers, David; Suriadi, Suriadi; Radke, Kenneth ... Computers & security, 09/2018, Volume: 78
    Journal Article
    Peer reviewed
    Open access

    Industrial control systems (ICS) are moving from dedicated communications to switched and routed corporate networks, exposing them to the Internet and placing them at risk of cyber-attacks. Existing ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPUK, ZRSKP

PDF
9.
  • Securing DNP3 Broadcast Com... Securing DNP3 Broadcast Communications in SCADA Systems
    Amoah, Raphael; Camtepe, Seyit; Foo, Ernest IEEE transactions on industrial informatics, 08/2016, Volume: 12, Issue: 4
    Journal Article
    Open access

    The Distributed Network Protocol version 3 (DNP3) provides Secure Authentication (DNP3-SA) as the mechanism to authenticate unicast messages from a master station to its outstations in supervisory ...
Full text
Available for: IJS, NUK, UL

PDF
10.
  • A Survey and Analysis of th... A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures
    Schmidt, Desmond; Radke, Kenneth; Camtepe, Seyit ... ACM computing surveys, 05/2016, Volume: 48, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Detection and prevention of global navigation satellite system (GNSS) "spoofing" attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
1 2 3 4 5
hits: 99

Load filters