Mostrando 8 resultados de: 8
Filtros aplicados
Publisher
Cluster Computing(1)
IRIS 2016 - 2016 IEEE 4th International Symposium on Robotics and Intelligent Sensors: Empowering Robots with Smart Sensors(1)
Information Technology Journal(1)
International Journal of Applied Engineering Research(1)
Journal of Electronic Testing: Theory and Applications (JETTA)(1)
Área temáticas
Ciencias de la computación(5)
Física aplicada(4)
Programación informática, programas, datos, seguridad(3)
Derecho penal(1)
Dirección general(1)
A specification based intrusion detection mechanism for the LEACH protocol
ArticleAbstract: With the improvement of the wireless communication and embedded technology, the application of wirelPalabras claves:Intrusion detection system, Low energy adaptive clustering hierarchy protocol, Misbehavior, Network performance analysis, Network simulation, security, wireless sensor networkAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusDevelopment of a timestamping web application for the electronic factoring process in Ecuador
ArticleAbstract: This document describes the experience in developing a Timestamping application for the Electronic FPalabras claves:FACTORING, security, Timestamping, UWE, XMLAutores:Jesus Mendoza Macias, Sang Guun YooFuentes:googlescopusDDoS avoidance strategy for service availability
ArticleAbstract: Defending from DDoS attacks have become more difficult because they have evolved in many ways. AbsenPalabras claves:DDoS, security, Service availabilityAutores:Kang S.H., Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusEnhanced BSN-Care: Cryptanalysis of BSN-Care and proposal of improved authentication system
Conference ObjectAbstract: Recently, loT based healthcare systems have evolved as a tool to enhance the quality of life of peopPalabras claves:BAN logic, Healthcare service, internet of things, security, Sensor network, user authenticationAutores:Fidel Gastro de la Gruz, Sang Guun YooFuentes:googlescopusJTAG security system based on credentials
ArticleAbstract: JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments.Palabras claves:authentication, Credential, JTAG, securityAutores:Kim J., Kim T., Park K.Y., Sang Guun YooFuentes:googlescopusSecurity over smart home automation systems: A survey
Conference ObjectAbstract: Internet of Things (IoT) is growing every day since it has allowed the interconnection of differentPalabras claves:IOT, MECHANISMS, security, SHAS, Smart homeAutores:Barriga J.J.A., Sang Guun YooFuentes:googlescopusPrivacy protection mechanism for indoor positioning systems
ArticleAbstract: Usageoflocation based services in indoor environments has grown as the popularity of smart devices hPalabras claves:indoor positioning system, Location based service, privacy, securityAutores:Kim J., Kim S., Sang Guun YooFuentes:googlescopusSoftware architecture of JTAG security system
ArticleAbstract: The issue of JTAG security has recently become of interest not only to academic researchers but alsoPalabras claves:JTAG, RUP, security, Software architectureAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus