To search, Click below search items.
All Published Papers Search Service
Title
Inadvertent Threat Detection According to Power System Components
Author
Hyuk Kim, Jung-Chan Na
Vol. 12 No. 12 pp. 1-5
Keywords
IEC 62351-7, Invalid Network Access, Inadvertent Threat, Component
A Virtualised High Trust Zone (VHTZ) to Mitigate the Security and Privacy Issues in Cloud Computing
Tanveer A Zia, Bhupesh Mansukhani
Vol. 12 No. 12 pp. 6-14
Cloud security, high trust zone, infrastructure as a service, VM threats, network monitoring
Smart Decision Making for Internal Attacks in Wireless Sensor Network
Muhammad R Ahmed, Xu Huang, Hongyan Cui
Vol. 12 No. 12 pp. 15-23
Wireless Sensor Network (WSN), internal attack, Abnormal Behavior Identification Mechanism (ABIM), Dempester Shafer Theory, Abnormal behavior
Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle
Jeehoon Lee, Jongsoo Jeong, Gyusang Shin, Seon-Tae Kim, Pyeongsoo Mah
Vol. 12 No. 12 pp. 24-29
Low-power and Lossy Networks, Wake-up interval, Media Access Control, 6LoWPAN, CoAP