Now showing items 1-10 of 15
Improved Security Performance for VANET Simulations
(4th IFAC Symposium on Telematics Applications, 2016-12-06)
Upcoming deployments of Vehicular Ad Hoc Networks (VANETs) in Europe are expected to sign and verify packets secured by cryptographic signatures by default. Thus, when VANET simulations are used for development and test ...
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development
This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been ...
SSH Honeypot: Building, Deploying and Analysis
(SAI Organisation, 2016-05)
This article is set to discuss the various techniques that can be used while developing a honeypot, of any form, while considering the advantages and disadvantages of these very different methods. The foremost aims are to ...
The mimetic virus: A vector for cyber security
Like conventional terrorism, cyberterrorism has the same aims and goals but the act is done exclusively within cyberspace where the computer is both weapon and target. Unlike conventional terrorism, ...
MIMO Techniques for Jamming Threat Suppression in Vehicular Networks
Personalized Students' Profile Based on Ontology and Rule-based Reasoning
(ICST Transactions, 2016)
Nowadays, most of the existing e-learning architecture provides the same content to all learners due to "one size fits for all" concept. E-learning refers to the utilization of electronic innovations to convey and encourage ...
Social internet of vehicles for smart cities
(Multidisciplinary Digital Publishing Institute, 2016-01)
Human Behaviour as an aspect of Cyber Security Assurance
There continue to be numerous breaches publicised pertaining to cyber security despite security practices being applied within industry for many years. This article is intended to be the first in a number of articles as ...
Blocking Epidemics Propagation in Vehicular Networks
The propagation of software viruses over a vehicular network where vehicles communicate via V2V links can have disastrous effects for the vehicles themselves and the ad hoc network. Here, we propose a simple distributed ...
Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
Modern Supervisory Control and Data Acquisition SCADA systems used bythe electric utility industry to monitor and control electric power generation,transmission and distribution are recognized today as critical components ...