Such complex hardware and programmable techniques bring security opportunities to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced. They also bring security challenges related to our computing systems and software architectures ...
网络化微电网的网络安全和弹性 Cybersecurity and Resilience of Networked Microgrids IAS 2024 IEEE Transactions on Industry Application 2024年特刊征稿,诚邀各位专家学者积极投稿!特刊主题是网络化微电网的网络安全与弹性(cybersecurity and resilience of networked microgrids)。 专题大纲 网络化微电网(NMG)作为配电网...
2025 IEEE 10th International Conference on Cyber Security and Information Engineering (ICCSIE 2025) July 23-25, 2025 | China-Xining 2025年7月23-25日,中国-西宁 出版:IEEE Conference Publishing Services(ISBN:979-8-3503-4361-8) 检索:IEEE Xplore | EI Compendex 第十届网络安全与信息工程国际会议 (IC...
security Cyber physical systems Automotive cyber security Autonomous systems cyber security CPS attack modeling Criticial infrastrucutre security Cyber-physical attacks Digital twins and cyber-security eHealth security Embedded systems security Harware security Industrial control systems security Industrial IoT ...
power grid to enhance its efficiency, reliability, security, electricity affordability and sustainability while enabling new services, skills, and customer empowerment. However, it poses significant challenges, such as data priva...
Generative AI impact on cybersecurity Vision transformer (computer vision) Object detection (computer vision) Image super-resolution ChatGPT user perceptions and experiences Radar-based health monitoring Artificial intelligence ethics 6G vision a...
1、第十一届IEEE网络安全与云计算国际会议The 11th IEEE International Conference on Cyber Security and Cloud Computing(IEEE CSCloud 2024,网址请看:https://www.cloud-conf.net/cscloud/2024/cscloud/) 2、第十届IEEE边缘计算与可扩展云国际会议The 10th IEEE International Conference on Edge Computing and Scala...
Security in building automation systems - a first analysis IEEE2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security)GRANZER, W., PRAUS, F., AND KASTNER, W. Security... T Mundt,P Wickboldt - International Conference on Cyber Security & Protection of...
E-commerce mobile commerce, logistics; transportation related issues; cyber security tor energy and...
Application of Quantum Computing in Cyber Security Quantum Computing in Large Scale AI. Sensor networks, mesh networks, MIMO and 6G Edge computing, IoT connectivity, and energy harvesting LEO (Low Earth Orbit) satellite/HAPS (High Altitude Platform System) Communication & its scale and applications ...