NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.258
1.
  • AuDI: Toward Autonomous IoT... AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication
    Marchal, Samuel; Miettinen, Markus; Nguyen, Thien Duc ... IEEE journal on selected areas in communications, 06/2019, Letnik: 37, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    IoT devices are being widely deployed. But the huge variance among them in the level of security and requirements for network resources makes it unfeasible to manage IoT networks using a common ...
Celotno besedilo

PDF
2.
  • The Cybersecurity Landscape... The Cybersecurity Landscape in Industrial Control Systems
    McLaughlin, Stephen; Konstantinou, Charalambos; Wang, Xueyang ... Proceedings of the IEEE 104, Številka: 5
    Journal Article
    Recenzirano

    Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based systems to modern information and communication technology (ICT)-based systems creating a close coupling ...
Celotno besedilo
3.
  • Security and privacy challe... Security and privacy challenges in industrial internet of things
    Sadeghi, Ahmad-Reza; Wachsmann, Christian; Waidner, Michael Proceedings of the 52nd Annual Design Automation Conference, 06/2015
    Conference Proceeding

    Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and ...
Celotno besedilo
4.
  • ASSURED: Architecture for S... ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices
    Asokan, N.; Nyman, Thomas; Rattanavipanon, Norrathep ... IEEE transactions on computer-aided design of integrated circuits and systems, 11/2018, Letnik: 37, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Secure firmware update is an important stage in the Internet of Things (IoT) device life-cycle. Prior techniques, designed for other computational settings, are not readily suitable for IoT devices, ...
Celotno besedilo

PDF
5.
  • DÏoT: A Federated Self-learning Anomaly Detection System for IoT
    Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus ... 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)
    Conference Proceeding
    Odprti dostop

    IoT devices are increasingly deployed in daily life. Many of these devices are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have ...
Celotno besedilo

PDF
6.
Celotno besedilo

PDF
7.
  • 1T‐2H Mixed‐Phase MoS2 Stab... 1T‐2H Mixed‐Phase MoS2 Stabilized with a Hyperbranched Polyethylene Ionomer for Mg2+/Li+ Co‐Intercalation Toward High‐Capacity Dual‐Salt Batteries
    Rahmatinejad, Jalal; Raisi, Bahareh; Liu, Xudong ... Small, 01/2024, Letnik: 20, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Dual‐salt magnesium/lithium‐ion batteries (MLIBs) benefit from fast lithium ion diffusion on the cathode side while providing safety due to the dendrite‐free Mg2+ stripping/plating mechanism on the ...
Celotno besedilo
8.
  • Counterfeit Object-oriented... Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
    Schuster, Felix; Tendyck, Thomas; Liebchen, Christopher ... 2015 IEEE Symposium on Security and Privacy, 05/2015
    Conference Proceeding
    Odprti dostop

    Code reuse attacks such as return-oriented programming (ROP) have become prevalent techniques to exploit memory corruption vulnerabilities in software programs. A variety of corresponding defenses ...
Celotno besedilo
9.
  • Multidimensional characteri... Multidimensional characterization of inducible promoters and a highly light-sensitive LOV-transcription factor
    Gligorovski, Vojislav; Sadeghi, Ahmad; Rahi, Sahand Jamal Nature communications, 06/2023, Letnik: 14, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The ability to independently control the expression of different genes is important for quantitative biology. Using budding yeast, we characterize GAL1pr, GALL, MET3pr, CUP1pr, PHO5pr, tetOpr, ...
Celotno besedilo
10.
  • Scenario-based stochastic o... Scenario-based stochastic optimal operation of wind, photovoltaic, pump-storage hybrid system in frequency- based pricing
    Zare Oskouei, Morteza; Sadeghi Yazdankhah, Ahmad Energy conversion and management, 11/2015, Letnik: 105
    Journal Article
    Recenzirano

    •Two-stage objective function is proposed for optimization problem.•Hourly-based optimal contractual agreement is calculated.•Scenario-based stochastic optimization problem is solved.•Improvement of ...
Celotno besedilo
1 2 3 4 5
zadetkov: 1.258

Nalaganje filtrov