Now showing items 1-5 of 5
Exploiting SCADA vulnerabilities using a Human Interface Device
(The Science and InformationOrganization, 2015)
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic ...
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities
(EAI Transactions on Secutiry and Safety, 2015-11-28)
Online shopping and banking institutes are a current trend in e-commerce, where online shopping and banking are frequently used over the Internet. With the fast growth of the technology and on-line practices, criminal ...
A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks
Vehicular networks have a diverse range of applications that vary from safety, to trafﬁc management and comfort. Vehicular communications (VC) can assist in the ecorouting of vehicles in order to reduce the overall mileage ...
A Novel Adaptive Learning Management System Using Ontology
(7th IEEE International Conference on Intelligent Computing and Information Systems, 2015-12)
The success of web technologies has prompted a developing consideration on e-learning activities. Notwithstanding, most current e-Learning systems give static web-based learning with the goal that learners get to the same ...
Social Clustering of Vehicles Based on Semi-Markov Processes
Vehicle clustering is a crucial network managementtask for vehicular networks in order to address the broadcaststorm problem, and also to cope with rapidly changing networktopology. Developing algorithms that ...