Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
SCADA cybersecurity awareness and teaching with Hardware-In-The-Loop platforms
Puys, Maxime, Thevenon, Pierre-Henri, Mocanu, Stéphane, Gallissot, Mathieu, Sivelle, Camille
Published in Journal of wireless mobile networks, ubiquitous computing and dependable applications (01.03.2022)
Published in Journal of wireless mobile networks, ubiquitous computing and dependable applications (01.03.2022)
Get full text
Journal Article
Loading…
Blockchain Mirage or Silver Bullet? A Requirements-driven Comparative Analysis of Business and Developers' Perceptions in the Accountancy Domain
Ribalta, Claudia, Lombard-Platet, Marius, Salinesi, Camille, Lafourcade, Pascal
Published in Journal of wireless mobile networks, ubiquitous computing and dependable applications (01.03.2021)
Published in Journal of wireless mobile networks, ubiquitous computing and dependable applications (01.03.2021)
Get full text
Journal Article
Loading…
Loading…
Blood Pressure Monitoring System using Remote and Secure Data Transmission
Christopher James Labrador, Gillian Claire Cancio, Krizia Dianne Congson, Kerr Jason Quevedo, Rhea Ann Verallo, James Michael Cañete
Published in Research briefs on information & communication technology evolution (01.12.2021)
Get full text
Published in Research briefs on information & communication technology evolution (01.12.2021)
Journal Article
Loading…
Development of a Stereo NDVI Imaging System Using Raspberry Pi
Jefferson Cañada, Van Patiluna
Published in Research briefs on information & communication technology evolution (01.12.2021)
Published in Research briefs on information & communication technology evolution (01.12.2021)
Get full text
Journal Article
Loading…
Mosquito Trapping Device Through Combination of Artificial Wing-Beat Sound and Yeast Generator
Bryan Espina, Xiannel Rome Villanueva, Shein Lee Gualiza, Jan Dave Campañera, Philip Virgil Astillo
Published in Research briefs on information & communication technology evolution (01.12.2021)
Published in Research briefs on information & communication technology evolution (01.12.2021)
Get full text
Journal Article
Loading…
Classroom Attendance Monitoring System Using Radio Frequency Identification with Web Application
John Dominic Aniñon, Kenneth Kent Flores, Cliff Sean Kyle Otadoy, John Paul Rodas, Julia Fe Tabaco, Jan Dave Campañera, Alvin Joseph Macapagal
Published in Research briefs on information & communication technology evolution (01.12.2021)
Published in Research briefs on information & communication technology evolution (01.12.2021)
Get full text
Journal Article
Loading…
Two novel cache management mechanisms on CPU-GPU heterogeneous processors
Huijing Yang, Tingwen Yu
Published in Research briefs on information & communication technology evolution (01.06.2021)
Published in Research briefs on information & communication technology evolution (01.06.2021)
Get full text
Journal Article
Loading…
Loading…
K-Coverage: A Monitor Node Selection Algorithm for Diffusion Source Localizations
Yuexin Zhang, Jianjun Zhang
Published in Research briefs on information & communication technology evolution (01.12.2020)
Published in Research briefs on information & communication technology evolution (01.12.2020)
Get full text
Journal Article
Loading…
A Survey on Detection Methods Against Internet Worm Attacks
Liang Wang
Published in Research briefs on information & communication technology evolution (01.12.2020)
Published in Research briefs on information & communication technology evolution (01.12.2020)
Get full text
Journal Article
Loading…
A visual analytics approach for the cyber forensics based on different views of the network traffic
Kotenko, Igor, Kalameyets, Maksim, Chechulin, Andrey, Chevalier, Yannick
Published in Journal of wireless mobile networks, ubiquitous computing and dependable applications (01.06.2018)
Published in Journal of wireless mobile networks, ubiquitous computing and dependable applications (01.06.2018)
Get full text
Journal Article
Loading…
A Context-Based Secure Handover Mechanism for Space-Ground-Integrated Network
Hang Zhao
Published in Research briefs on information & communication technology evolution (01.11.2020)
Published in Research briefs on information & communication technology evolution (01.11.2020)
Get full text
Journal Article
Loading…
Loading…
Loading…
Geofencing based Banking Authentication System: A Fraud Mitigation Technique
Kailash Kumar, Gaurav Choudhary
Published in Research briefs on information & communication technology evolution (01.10.2020)
Published in Research briefs on information & communication technology evolution (01.10.2020)
Get full text
Journal Article
Loading…
Mitigating DRDoS Network Attacks via Consolidated Deny Filter Rules
Booth, Todd, Andersson, Karl
Published in Research briefs on information & communication technology evolution (01.10.2020)
Published in Research briefs on information & communication technology evolution (01.10.2020)
Get full text
Journal Article
Loading…
Study on IoT Evacuation Support System in Event of Disasters
Tomoyuki Ishida, Kanae Sakamoto
Published in Research briefs on information & communication technology evolution (01.09.2020)
Published in Research briefs on information & communication technology evolution (01.09.2020)
Get full text
Journal Article
Loading…
Reference architecture for social networks graph analysis tool
Kolomeets, Maxim, Benachour, Amira, El Baz, Didier, Chechulin, Andrey, Strecker, Martin, Kotenko, Igor
Published in Journal of wireless mobile networks, ubiquitous computing and dependable applications (02.12.2019)
Published in Journal of wireless mobile networks, ubiquitous computing and dependable applications (02.12.2019)
Get full text
Journal Article
Loading…