Traditional environmental monitoring, which relies on manual sampling and laboratory analysis, often suffers from slow response times, high operational costs, and limited spatial or temporal resolution. These constraints hinder timely and... more
An effective method to attain improved security in identifying harmful activity in cloud computing during the past number of years has been A system for detecting intrusions (IDS). Efforts are being made on an intrusion detection system... more
In order to improve cybersecurity and stop criminal activity, network traffic anomaly detection is essential. Anomaly detection is an essential part of cybersecurity, which is necessary to find complex and until undiscovered network... more
Helpful discussions with Kazushige Goto and John McCalpin are gratefully acknowledged. Thanks to Dan Stanzione for his notes on cloud computing, Ernie Chan for his notes on scheduling of block algorithms, and John McCalpin for his... more
A major hindrance in industry modernization is the interoperability issues between existing legacy and new systems. Legacy systems normally have security vulnerabilities and are cost prohibitive to upgrade/replace. Thus, a feasible... more
Public disclosure of private data such as mobile phone numbers, dates of birth, identity card information, and financial data on social websites represents a significant threat to cybersecurity. Both external and internal intrusions... more
Quantum computing and artificial intelligence are transforming the cybersecurity landscape, dictating a reassessment of cryptographic resilience in the face of emerging threats. This study presents a structured approach to evaluating... more
The use of military drones poses a new level of global risk. Special interview with Robert Junqueira
This interview explores the transformative impact of military drone technology on global security, warfare, and ethical responsibility. Robert Junqueira argues that while drones represent disruptive technological advancement with... more
A Deus pela vida e por tudo mais que tem me concedido ao longo dela. Ao professor Dr. Fabrício Junqueira pela orientação, motivação e pelos conselhos. Também pela paciência e dedicação para o esclarecimento das dúvidas e incertezas que... more
Given the scale of consequences attributable to cyber attacks, the field of cybersecurity has long outgrown ad-hoc decision-making. A popular choice to provide disciplined decision-making in cybersecurity is Game Theory, which seeks to... more
CRYPTOGRAPHY & NETWORK SECURITY -BCS703
Module-3
Module-3
Ciberseguridad proactiva: de la reacción a la anticipación en un mundo cada vez más vulnerable
Executive Summary The war launched by the Russian Federation against Ukraine has caused the most severe geopolitical rupture in Europe since 1945, bringing high-intensity conventional confrontation back to the forefront and testing the... more
Renewable energy sources and further electrification of energy consumption are key enablers to decrease greenhouse gas emissions, but they also introduce increased complexity to the electric power system. The increased availability of... more
With the rising demand of home automation and sensor networks, the IEEE 802.15. 4 specification outlines a new class of physical and MAC layer protocols targeted at low power devices, personal area networks, and sensor nodes. Based on... more
Abstract: This research examined the incorporation of Artificial Intelligence (AI) competencies to enhance female students' engagement and involvement in brick/block laying and concreting training at technical institutions in Nigeria.... more
Este artículo analiza la reconfiguración que las tecnologías emergentes están produciendo en la relación entre organizaciones terroristas y grupos de crimen organizados en América Latina... more
The increasing reliance on the internet has heightened exposure to cyber threats, with malicious URLs being a significant concern. This research focuses on building a machine learning-based system to detect such URLs effectively. A Random... more
The proliferation of malicious Uniform Resource Locators (URLs) poses a significant cybersecurity threat, enabling phishing, malware distribution, and data breaches. Traditional detection methods like blacklisting struggle to keep pace... more
An Adaptive Energy Management System (AEMS) is proposed for smart grids, which integrates machine learning techniques with internet of things connectivity so as to improve predictive control ability, response times and even the... more
The Internet of Things (IoT) is already transforming industries, cities, and homes. The economic value of this transformation across all industries is estimated to be trillions of dollars and the societal impact on energy efficiency,... more
This paper outlines a first proposal of a formal semantics for the JADEL programming language. JADEL is an agent-oriented programming language based on JADE that has been recently proposed to ease the adoption of JADE, and to promote its... more
Proceedings of the 4th Workshop of the MPM4CPS COST Action with the presentations delivered during the workshop and papers with extended versions of some of them
Everyday safety issues in kitchens have become an area of concern because of the attendant increase in kitchen accidents in the domestic and commercial kitchens. Most people usually access and use kitchens for meal preparation which makes... more
This paper presents a systematic mapping study classifying existing scientific contributions on synergies of Model Driven Engineering (MDE), Artificial Intelligence/Machine Learning (AI/ML), and DevOps, with the overall objective of... more
This study delves into the relationship between cyber-physical systems (CPS) and economic security, with particular emphasis on how networking technologies facilitate more efficient data integration. It investigates how CPS adoption is... more
Phishing is a common form of cyberattack where fraudulent websites are used to deceive users into revealing sensitive information. Detecting phishing sites is crucial for enhancing online security. This study presents a machine... more
The escalating complexity and widespread deployment of autonomous systems, ranging from advanced industrial robotics to intelligent urban infrastructure, necessitate a paradigm shift in software engineering. These systems demand not only... more
With increasingly higher levels of automation in aerospace decision support systems, it is imperative that the human operator maintains the required level of situational awareness in different operational conditions and a central role in... more
One of the primary challenges facing Urban Air Mobility (UAM) and the safe integration of Unmanned Aircraft Systems (UAS) in the urban airspace is the availability of robust, reliable navigation and Sense-and-Avoid (SAA) systems. Global... more
Cyber-attacks that may pose a threat to critical infrastructures (CI) have the potential to cause wide-ranging negative effects ranging from economic losses to service interruptions and social chaos. Türkiye is in a high-risk group... more
Cyber-attacks that may pose a threat to critical infrastructures (CI) have the potential to cause wide-ranging negative effects ranging from economic losses to service interruptions and social chaos. Türkiye is in a high-risk group... more
Manufacturing systems under Industry 4.0, and their transition towards Industry 5.0, take into account the Quintuple Helix innovation model, associated with the sustainable development goals (SDGs) set by the UN and Horizon 2030, in which... more
This paper presents a Systematic Literature Review (SLR) that explores the intersection of Quick Response (QR) codes, cryptographic models, and card payment systems. With the rapid evolution of digital payment infrastructures, QR-based... more
One of the main challenges in wireless cyber-physical systems is to reduce the load of the communication channel while preserving the control performance. In this way, communication resources are liberated for other applications sharing... more
Blockchain-based Security Framework for IoT Devices in Industrial Automation: A Comprehensive Review
The widespread use of industrial automation Internet of Things (IoT) devices has seen great transformation in operational efficiency and decision-making. But these interconnected environments have nevertheless raised a major concern about... more
Providing innovative resource-efficient solutions able to mitigate temporal interference among cloud services, concurrently sharing the same underlying platform, is crucial to deploy highly time-sensitive applications at the edge of the... more
Supply chain 4.0 denotes the fourth revolution of supply chain management systems, integrating manufacturing operations with telecommunication and Information Technology processes. Although the overarching aim of supply chain 4.0 is the... more
Our CFM is simulated and the performance will be discussed analytically.
This paper deals with two issues: development of some advanced smart grid applications, and implementation of advanced testbeds to evaluate these applications. In each of the development cases, the role of the testbeds is explained and... more
получена 2 ноября 2017 Аннотация. Рассматривается задача проверки допустимости конфигураций модульных вычислительных систем реального времени (МВС РВ). Конфигурация считается допустимой, если все работы успевают выполниться на МВС РВ в... more
Global supply networks, once designed for maximum efficiency and Just-in-Time (JIT) delivery, are now shown to be highly vulnerable due to the escalating polycrisis of geopolitical instability, climatic disruptions, and pandemics. This... more
The Constrained Application Protocol (CoAP) is a lightweight application layer protocol for the Internet of Things. CoAP is based on HTTP mechanisms to build RESTful web services. In contrast to HTTP, CoAP was designed for... more
Decomposition is one of the commonly used techniques applied in the design of Petri net-based cyber-physical systems. Such an operation permits the splitting of the initial system into sequential components that can be further implemented... more
This study proposes a cyber-physical framework for the integration of a heterogeneous swarm of robots, sensors, microrobots, and AR for structural health monitoring and confined space inspection based on the application's unique... more
The object of research is IEEE 802.11 (Wi-Fi) networks, which are often the targets of a group of attacks called "evil twin". Research into this area is extremely important because Wi-Fi technology is a very common method of... more
The food manufacturing industry is one of the key manufacturing sectors across the world and is a vital strategic element in all national economies. Currently, it's fifth most automated industry in the organised sector, but it has one of... more
While in the past the robustness of transportation networks was studied considering the cyber and physical space as isolated environments this is no longer the case. Integrating the Internet of Things devices in the sensing area of... more