The Internet of Things (IoT) is a global network of 'smart gadgets' that can sense their environment, connect to them, and communicate with people and other systems. This articles presents an IoT control cente...
详细信息
For newcomers and tourists, navigating university campuses can be difficult, resulting in aggravation and lost time. We respond by introducing 'GikiLenS', an object identification application driven by deep le...
详细信息
The process of a supply chain involves a series of activities that distribute, assemble, and manage products, transferring them from the supplier to the end consumer. It operates as a complex, interconnected network r...
详细信息
ISBN:
(数字)9798331539948
ISBN:
(纸本)9798331539955
The process of a supply chain involves a series of activities that distribute, assemble, and manage products, transferring them from the supplier to the end consumer. It operates as a complex, interconnected network regulated by supply and demand. Security in supply chain management is a crucial aspect of its overall security measures, focusing primarily on maintaining essential end-to-end protection. Without this, several attacks can be used to manipulate data and valuable information from the entire chain of networks. This paper explains how encrypted intermediates can secure the entire SCM by validating each intermediate using public-private key encryption. We also demonstrate and assess how the proposed AAF-SCM model can aid in tracing security breaches or unauthorized data tampering. We also validate this model against nefarious attacks like Fabrication, Assertion, Deletion, and Modification. Finally, we propose opportunities to develop innovative systems that enhance security through intermediary steps.
The human brain's intricate functions are under-pinned by a vast network of synapses that enable chemical impulses between neurons. Neuroscientists employ two key approaches, functional and effective connectivity,...
详细信息
Smart Healthy Schools (SHS) are a new paradigm in building engineering and infection risk control in school buildings where the disciplines of Indoor Air Quality (IAQ), IoT (Internet of Things) and Artificial Intellig...
详细信息
In recent years, machine learning (ML) based digital twins (DTs) have seen widespread application in the anomaly detection domain. A search-based literature survey revealed that the majority of the case studies focus ...
详细信息
The increasing threat to individual privacy and personalized digital content on social media posed by Deepfakes has highlighted the importance for a secure and reliable multimedia content integrity mechanism. In this ...
详细信息
In recent years, the use of sensor networks has grown very much, a large number of sensors are being introduced everywhere, which are used for various purposes - for example, monitoring the state of the air. In this a...
详细信息
Closed-form expressions for outage and capacity in cooperative diversity best-relay selection scheme are known in literature only for the special case of Rayleigh fading channels. In this paper, we consider the best-r...
详细信息
To manage the high load fluctuations arising from renewable energy integration, the Ministry of Power Govt. of India has launched real-time trading in the energy market. In this paper, we discuss the real-time market ...
详细信息
暂无评论