Sign Up to like & get
recommendations!
0
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-017-4106-6
Abstract: In this paper, a wireless security monitoring system is developed for the safety of chemistry and chemical laboratories. The remote monitoring and control functions of the laboratory are realized by receiving the information from the…
read more here.
Keywords:
monitoring system;
chemistry chemical;
chemistry;
security monitoring ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2881998
Abstract: The paper discusses a new framework combining the possibilities of Big Data processing and machine leaning developed for security monitoring of mobile Internet of Things. The mathematical foundations and the problem statement are considered. The…
read more here.
Keywords:
framework;
machine;
security monitoring;
big data ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Communications Magazine"
DOI: 10.1109/mcom.003.2200046
Abstract: Data auditing is a process to consistently keep the quality of data high, but this process is generally missing in network security monitoring. When network-based intrusion detection systems catch any suspicious packet, they generate alert…
read more here.
Keywords:
network;
security;
security monitoring;
network security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Network"
DOI: 10.1109/mnet.2018.1800151
Abstract: Distinguishing outliers from normal data in wireless sensor networks has been a big challenge in the anomaly detection domain, mostly due to the nature of the anomalies, such as software or hardware failures, reading errors…
read more here.
Keywords:
security monitoring;
network security;
monitoring based;
anomaly detection ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2021.3082079
Abstract: According to the IEC 62351-7 standard, data collection using network and system management (NSM) can be used to support the security monitoring of the smart grid. In this article, an NSM security monitoring platform for…
read more here.
Keywords:
system;
network;
iec;
iec 62351 ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Power Systems"
DOI: 10.1109/tpwrs.2020.3042210
Abstract: Transient stability boundary (TSB) is an important tool in power system online security monitoring, but practically it suffers from high computational burden using state-of-the-art methods, such as time-domain simulation (TDS), with numerous scenarios taken into…
read more here.
Keywords:
security monitoring;
stability boundary;
online security;
transient stability ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Future Internet"
DOI: 10.3390/fi14090250
Abstract: The Internet of Things (IoT) has rapidly progressed in recent years and immensely influenced many industries in how they operate. Consequently, IoT technology has improved productivity in many sectors, and smart farming has also hugely…
read more here.
Keywords:
cloud;
security;
internet things;
security monitoring ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Symmetry"
DOI: 10.3390/sym13122425
Abstract: Modern cyber-physical systems (CPS) use digital control of physical processes. This allows attackers to conduct various cyberattacks on these systems. According to the current trends, an information security monitoring system (ISMS) becomes part of a…
read more here.
Keywords:
information security;
security;
cps;
security monitoring ... See more keywords