NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.271
1.
  • AuDI: Toward Autonomous IoT... AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication
    Marchal, Samuel; Miettinen, Markus; Nguyen, Thien Duc ... IEEE journal on selected areas in communications, 06/2019, Letnik: 37, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    IoT devices are being widely deployed. But the huge variance among them in the level of security and requirements for network resources makes it unfeasible to manage IoT networks using a common ...
Celotno besedilo

PDF
2.
  • The Cybersecurity Landscape... The Cybersecurity Landscape in Industrial Control Systems
    McLaughlin, Stephen; Konstantinou, Charalambos; Wang, Xueyang ... Proceedings of the IEEE 104, Številka: 5
    Journal Article
    Recenzirano

    Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based systems to modern information and communication technology (ICT)-based systems creating a close coupling ...
Celotno besedilo
3.
  • Security and privacy challe... Security and privacy challenges in industrial internet of things
    Sadeghi, Ahmad-Reza; Wachsmann, Christian; Waidner, Michael Proceedings of the 52nd Annual Design Automation Conference, 06/2015
    Conference Proceeding

    Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and ...
Celotno besedilo
4.
  • ASSURED: Architecture for S... ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices
    Asokan, N.; Nyman, Thomas; Rattanavipanon, Norrathep ... IEEE transactions on computer-aided design of integrated circuits and systems, 11/2018, Letnik: 37, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Secure firmware update is an important stage in the Internet of Things (IoT) device life-cycle. Prior techniques, designed for other computational settings, are not readily suitable for IoT devices, ...
Celotno besedilo

PDF
5.
  • DÏoT: A Federated Self-learning Anomaly Detection System for IoT
    Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus ... 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)
    Conference Proceeding
    Odprti dostop

    IoT devices are increasingly deployed in daily life. Many of these devices are, however, vulnerable due to insecure design, implementation, and configuration. As a result, many networks already have ...
Celotno besedilo

PDF
6.
  • IoT SENTINEL: Automated Dev... IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
    Miettinen, Markus; Sadeghi, Ahmad-Reza; Marchal, Samuel ... 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 06/2017
    Conference Proceeding
    Odprti dostop

    With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office ...
Celotno besedilo

PDF
7.
Celotno besedilo

PDF
8.
  • 1T‐2H Mixed‐Phase MoS2 Stab... 1T‐2H Mixed‐Phase MoS2 Stabilized with a Hyperbranched Polyethylene Ionomer for Mg2+/Li+ Co‐Intercalation Toward High‐Capacity Dual‐Salt Batteries
    Rahmatinejad, Jalal; Raisi, Bahareh; Liu, Xudong ... Small (Weinheim an der Bergstrasse, Germany), 01/2024, Letnik: 20, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Dual‐salt magnesium/lithium‐ion batteries (MLIBs) benefit from fast lithium ion diffusion on the cathode side while providing safety due to the dendrite‐free Mg2+ stripping/plating mechanism on the ...
Celotno besedilo
9.
  • Counterfeit Object-oriented... Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
    Schuster, Felix; Tendyck, Thomas; Liebchen, Christopher ... 2015 IEEE Symposium on Security and Privacy, 05/2015
    Conference Proceeding
    Odprti dostop

    Code reuse attacks such as return-oriented programming (ROP) have become prevalent techniques to exploit memory corruption vulnerabilities in software programs. A variety of corresponding defenses ...
Celotno besedilo
10.
  • Multidimensional characteri... Multidimensional characterization of inducible promoters and a highly light-sensitive LOV-transcription factor
    Gligorovski, Vojislav; Sadeghi, Ahmad; Rahi, Sahand Jamal Nature communications, 06/2023, Letnik: 14, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The ability to independently control the expression of different genes is important for quantitative biology. Using budding yeast, we characterize GAL1pr, GALL, MET3pr, CUP1pr, PHO5pr, tetOpr, ...
Celotno besedilo
1 2 3 4 5
zadetkov: 1.271

Nalaganje filtrov