Searched for: collection%253Air
(1 - 20 of 36)

Pages

document
Yang, Zhe (author), Liu, Zhou (author), Zhang, Qi (author), Chen, Zhe (author), de Jesus Chavez, Jose (author), Popov, M. (author)
The traditional fault control strategy of converter-interfaced renewable energy sources (CIRESs) may bring about a lower sensitivity level or misoperation of fault component-based directional elements. To overcome this problem, a new control scheme is proposed to adjust sequence impedance angles of CIRESs by computing suitable current...
journal article 2023
document
Mariot, L. (author), Picek, S. (author), R Yorgova, R.A. (author)
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a McEliece-type cryptosystem using large minimum distance error-correcting codes derived from...
journal article 2023
document
Ahmadvand, Hossein (author), Lal, C. (author), Hemmati, Hadi (author), Sookhak, Mehdi (author), Conti, M. (author)
In recent years, the use of Software Defined Networking (SDN) has increased due to various network management requirements. Using SDN in computer network applications has brought several benefits to users, including lower operational costs, better hardware management, flexibility, and centralized network deployment. On the other hand, the...
journal article 2023
document
Chen, E. (author), Zhu, Yan (author), Liang, K. (author), Yin, Hongjian (author)
The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach of sensitive data. Aiming at this concern, we present a new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Access Control Markup Language (ABAC/XACML) model, client-side Ciphertext...
journal article 2023
document
Jansen, B.A. (author), Kadenko, N.I. (author), Broeders, Dennis (author), van Eeten, M.J.G. (author), Borgolte, K. (author), Fiebig, T. (author)
In just a few years, the issue of “digital sovereignty” has emerged as an important security issue for governments across the globe, reflecting a growing unease about the security risks associated with government services that depend on foreign service providers for digital infrastructure and traffic routing. This work investigates to which...
journal article 2023
document
Wang, Lili (author), Lin, Ye (author), Yao, Ting (author), Xiong, Hu (author), Liang, K. (author)
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize...
journal article 2023
document
El-Zawawy, Mohamed A. (author), Lal, C. (author), Conti, M. (author)
With the rapid technological advancement in the Internet of Things (IoT) and Internet of Vehicles (IoV), we witness exponential growth of Connected and Autonomous Vehicles (CAVs). However, these integrations of IoV with other technologies make the IoV network and its interaction between different network components highly complex. Therefore,...
journal article 2023
document
Wei, Xiaoguang (author), Liu, Y. (author), Shi, Jian (author), Gao, Shibin (author), Li, Xingpeng (author), Han, Zhu (author)
This article offers a novel perspective on identifying the critical branches under load redistribution (LR) attacks. Compared to the existing literature that is largely disruption-driven and based on dc state estimation, we propose to address the threat from LR attacks on a more fundamental level by modeling and analyzing the circulation of...
journal article 2023
document
Iaiani, Matteo (author), Tugnoli, Alessandro (author), Cozzani, Valerio (author), Reniers, G.L.L.M.E. (author), Yang, M. (author)
Offshore Oil&Gas facilities are attractive targets of intentional malicious attacks (security attacks) that may trigger cascading events (e.g., the release and dispersion of hazardous material and/or energy, fires, explosions) with consequences on people, environment, and assets. The severity of these consequences is potentially similar to...
journal article 2023
document
Li, Meng (author), Chen, Yifei (author), Zhu, Liehaung (author), Zhang, Zijian (author), Ni, Jianbing (author), Lal, C. (author), Conti, M. (author)
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and lack of transparency. Blockchain-based solutions neglect...
journal article 2023
document
He, Daojing (author), Du, Runmeng (author), Zhu, Shanshan (author), Zhang, Min (author), Liang, K. (author), Chan, Sammy (author)
Data island effectively blocks the practical application of machine learning. To meet this challenge, a new framework known as federated learning was created. It allows model training on a large amount of scattered data owned by different data providers. This article presents a parallel solution for computing logistic regression based on...
journal article 2022
document
Pirani, Mohammad (author), Baldi, S. (author), Johansson, Karl Henrik (author)
This paper presents a comprehensive study on the impact of information flow topologies on the resilience of distributed algorithms that are widely used for estimation and control in vehicle platoons. In the state of the art, the influence of information flow topology on both internal and string stability of vehicle platoons has been well...
journal article 2022
document
Yu, Xinghuo (author), Tang, Changbing (author), Palensky, P. (author), Colombo, Armando (author)
Imagine you want to send money to a friend overseas. Wouldn't it be good if you didn't have to pay hefty fees to the intermediaries, and your friend received the funds very quickly? Now imagine ordering parts to make a product in your manufacturing plant. Wouldn't it be great if you were able to verify where each part comes from and have...
journal article 2022
document
Bellizio, Federica (author), Xu, Wangkun (author), Qiu, Dawei (author), Ye, Yujian (author), Papadaskalopoulos, Dimitrios (author), Cremer, Jochen (author), Teng, Fei (author), Strbac, Goran (author)
Digitalization is one of the key drivers for energy system transformation. The advances in communication technologies and measurement devices render available a large amount of operational data and enable the centralization of such data storage and processing. The greater access to data opens up new opportunities for a more efficient and...
journal article 2022
document
El-Zawawy, Mohamed A. (author), Brighente, Alessandro (author), Conti, M. (author)
Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet of vehicles) envision the simultaneous collection of multiple data types. Although authentication may prevent unauthorized users to access the collected data, existing...
journal article 2022
document
de Wit, J.J. (author), Pieters, Wolter (author), Jansen, S.J.T. (author), van Gelder, P.H.A.J.M. (author)
Security professionals play a decisive role in security risk decision making, with important implications for security in organisations and society. Because of this subjective input in security understanding possible biases in this process is paramount. In this paper, well known biases as observed and described in prospect theory are studied in...
journal article 2021
document
Sas, Marlies (author), Ponnet, Koen (author), Reniers, G.L.L.M.E. (author), Hardyns, Wim (author)
As policy makers are developing new alternative strategies to prevent bicycle theft, a nudging approach could provide useful insights in this field. In the current study, two different nudges were implemented at a selection of bicycle parking facilities in the neighborhood of a Belgian university campus. To measure the effectiveness of the...
journal article 2021
document
Li, Jie (author), Goerlandt, Floris (author), van Nunen, K.L.L. (author), Reniers, G.L.L.M.E. (author)
Safety and security are often considered in complimentary or opposing terms. Discussions on their conceptual meaning have been put forward, and calls for an increased integration of these domains have been made. Nevertheless, there is currently no high-level empirical comparison of the development and contents of these research domains. In this...
journal article 2021
document
Smith, Marcus (author), Miller, S.R.M. (author)
Biometric facial recognition is an artificial intelligence technology involving the automated comparison of facial features, used by law enforcement to identify unknown suspects from photographs and closed circuit television. Its capability is expanding rapidly in association with artificial intelligence and has great potential to solve crime...
journal article 2021
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
E-commerce platforms incorporate reputation systems that allow customers to rate suppliers following financial transactions. Existing reputation systems cannot defend the centralized server against arbitrarily tampering with the supplier’s reputation. Furthermore, they do not offer reputation access across platforms. Rates are faced with privacy...
journal article 2021
Searched for: collection%253Air
(1 - 20 of 36)

Pages