Articles with "security based" as a keyword



Photo by scottwebb from unsplash

Security-Based Passivity Analysis of Markov Jump Systems via Asynchronous Triggering Control.

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE transactions on cybernetics"

DOI: 10.1109/tcyb.2021.3090398

Abstract: This article considers the security-based passivity problem for a class of discrete-time Markov jump systems in the presence of deception attacks, where the deception attacks aim to change the transmitted signal. Considering the impact of… read more here.

Keywords: security based; passivity; markov jump; deception attacks ... See more keywords
Photo from wikipedia

Security-Based Differences in Touch Behavior and Its Relational Benefits

Sign Up to like & get
recommendations!
Published in 2021 at "Social Psychological and Personality Science"

DOI: 10.1177/1948550620929164

Abstract: Affectionate touch is crucial to the development of attachment security in infancy, yet little is known about how attachment and touch are related in adulthood. For adults high in anxiety, touch provision can maintain proximity,… read more here.

Keywords: received touch; security based; security; touch provision ... See more keywords
Photo by scottwebb from unsplash

A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2023 at "Sustainability"

DOI: 10.3390/su15097198

Abstract: Underwater wireless sensor networks (UWSNs) are comprised of sensor nodes that are deployed under the water having limited battery power and other limited resources. Applications of UWSNs include monitoring the quality of the water, mine… read more here.

Keywords: security based; wireless sensor; based schemes; sensor networks ... See more keywords