Now showing items 1-10 of 17
A Security Evaluation Framework for U.K. E-Goverment Services Agile Software Development
This study examines the traditional approach to software development within the United Kingdom Government and the accreditation process. Initially we look at the Waterfall methodology that has been ...
Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject ...
Prevention of crime in B2C E-Commerce: How E-Retailers/Banks protect themselves from Criminal Activities
(EAI Transactions on Secutiry and Safety, 2015-11-28)
Online shopping and banking institutes are a current trend in e-commerce, where online shopping and banking are frequently used over the Internet. With the fast growth of the technology and on-line practices, criminal ...
The mimetic virus: A vector for cyber security
Like conventional terrorism, cyberterrorism has the same aims and goals but the act is done exclusively within cyberspace where the computer is both weapon and target. Unlike conventional terrorism, ...
MIMO Techniques for Jamming Threat Suppression in Vehicular Networks
A Robust Eco-Routing Protocol Against Malicious Data in Vehicular Networks
Vehicular networks have a diverse range of applications that vary from safety, to trafﬁc management and comfort. Vehicular communications (VC) can assist in the ecorouting of vehicles in order to reduce the overall mileage ...
Convergence of Detection Probability, Computational Gains and Asymptotic Analysis of an Algorithm for Physical-Layer Intrusion Detection System
Asymptotic analysis of an algorithm is crucial for practical engineering design. It provides important information about the performance of an algorithm in terms of time complexity, space complexity, and input scale. Based ...
Cooperative approaches for dymanic wireless charging of Electric Vehicles in a smart city
In this paper, a method of electric vehicles charging with the use of large truck/bus vehicles moving along national highways and provincial roads is proposed and described. The method relies on charging vehicles from ...
Blocking Epidemics Propagation in Vehicular Networks
The propagation of software viruses over a vehicular network where vehicles communicate via V2V links can have disastrous effects for the vehicles themselves and the ad hoc network. Here, we propose a simple distributed ...
New measures for characterizing the significance of nodes in wireless ad hoc networks via localized path-based neighborhood analysis
The synergy between social network analysis and wireless ad hoc network protocol design has recently created increased interest for developing methods and measures that capture the topological characteristics of a wireless ...