[HTML][HTML] Cybersecurity challenges in vehicular communications

Z El-Rewini, K Sadatsharan, DF Selvaraj… - Vehicular …, 2020 - Elsevier
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-
Everything (V2X) communication technologies mature, the necessity to secure …

A Systematic Literature Review on RAMS analysis for critical infrastructures protection

S Pirbhulal, V Gkioulos, S Katsikas - International Journal of Critical …, 2021 - Elsevier
Abstract Reliability, Availability, Maintainability, and Safety/Security (RAMS) analysis of
Critical Infrastructures (CIs) can be applied to investigate their performance subjected to …

[PDF][PDF] A comprehensive IoT attacks survey based on a building-blocked reference model

HA Abdul-Ghani, D Konstantas… - International Journal of …, 2018 - academia.edu
Internet of Things (IoT) has not yet reached a distinctive definition. A generic understanding
of IoT is that it offers numerous services in many domains, utilizing conventional internet …

[HTML][HTML] Towards secure authenticating of cache in the reader for RFID-based IoT systems

CT Li, CC Lee, CY Weng, CM Chen - Peer-to-Peer Networking and …, 2018 - Springer
The use of radio frequency identification (RFID) in Internet of things (IoT) has led to a
significant progress in numerous intelligent devices. However, due to its restrictions on …

An application of Convolutional Neural Network to lobster grading in the Southern Rock Lobster supply chain

SA Vo, J Scanlan, P Turner - Food Control, 2020 - Elsevier
Abstract Southern Rock Lobster (SRL) is an important commercial export fishery of the
Australian economy with a contribution of $250 million annually. However, a range of risks …

Security and privacy issues in Blockchained IoT: Principles, Challenges and counteracting actions

M Gupta, S Sharma, C Sharma - Blockchain Technology, 2022 - taylorfrancis.com
Recently, both the Internet of Things (IoT) and Blockchain have gained enormous adaptation
and popularity in information-based systems. The inherent problem with IoT is security at …

Lightweight security protocol for chipless RFID in Internet of Things (IoT) applications

V Sharma, A Vithalkar, M Hashmi - 2018 10th International …, 2018 - ieeexplore.ieee.org
The RFID based communication between objects within the framework of IoT is potentially
very efficient in terms of power requirements and system complexity. The new design …

Convolutional Neural Networks for individual identification in the Southern Rock Lobster supply chain

SA Vo, J Scanlan, P Turner, R Ollington - Food Control, 2020 - Elsevier
In most traceability system, product identification is the key to enable the tracking activities
along the supply chain to be carried out. Product tagging using barcode and RFID is the …

[HTML][HTML] Traceability analysis of recent RFID authentication protocols

SM Alavi, K Baghery, B Abdolmaleki… - Wireless Personal …, 2015 - Springer
Radio frequency identification (RFID) technology is a prominent technology which has been
used in most authentication and identification applications. Above all, recently RFID systems …

Exploiting Petri nets to support fault tree based dependability analysis

A Bobbio, G Franceschinis, R Gaeta… - … Workshop on Petri …, 1999 - ieeexplore.ieee.org
This paper explores the possibility of converting Fault Trees (FT) into the Generalized
Stochastic Petri Net (GSPN) formalism. Starting from a slightly modified version of a …