We review the state of the art of privacypreserving schemes for ad hoc social networks including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …
D Fang, Y Qian, RQ Hu - IEEE access, 2017 - ieeexplore.ieee.org
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive study on the security of …
Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970's, the term SCADA emerged, describing the automated control and data …
Vulnerability becomes a major threat to the security of many systems. Attackers can steal private information and perform harmful actions by exploiting unpatched vulnerabilities …
The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these devices tremendously important. Unfortunately, despite all progress in security and …
Cyber-physical systems (CPSs) integrate computing and communication capabilities to monitor and control physical processes. In order to do so, communication networks are …
W Yusheng, F Kefeng, L Yingxu… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
Modbus over TCP/IP is one of the most popular industrial network protocol that are widely used in critical infrastructures. However, vulnerability of Modbus TCP protocol has attracted …
V Sharma, K Lee, S Kwon, J Kim, H Park… - Security and …, 2017 - Wiley Online Library
“Internet of Things”(IoT) bridges the communication barrier between the computing entities by forming a network between them. With a common solution for control and management of …
G Oliva, S Cioabă… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we provide a distributed methodology to allow a network of agents, tasked to execute a distributed algorithm, to overcome Man-in-the-Middle (MITM) attacks that aim at …