Articles with "security monitoring" as a keyword



Low‐Power Optoelectronic Hybrid Perovskite‐Based Memristor for Ternary Hardware Security Monitoring

Sign Up to like & get
recommendations!
Published in 2025 at "Advanced Functional Materials"

DOI: 10.1002/adfm.202516930

Abstract: Secure intelligent electronics with high integration and adaptability are critical for next‐generation information systems. However, previously reported hardware systems typically employ separate sensing, memory, and processing modules, leading to increased system complexity, high latency, and… read more here.

Keywords: security; hardware security; hybrid perovskite; security monitoring ... See more keywords
Photo by scottwebb from unsplash

Research and Application of Wireless Security Monitoring System in Chemistry and Chemical Engineering Laboratory

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4106-6

Abstract: In this paper, a wireless security monitoring system is developed for the safety of chemistry and chemical laboratories. The remote monitoring and control functions of the laboratory are realized by receiving the information from the… read more here.

Keywords: monitoring system; chemistry chemical; chemistry; security monitoring ... See more keywords
Photo from wikipedia

Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2881998

Abstract: The paper discusses a new framework combining the possibilities of Big Data processing and machine leaning developed for security monitoring of mobile Internet of Things. The mathematical foundations and the problem statement are considered. The… read more here.

Keywords: framework; machine; security monitoring; big data ... See more keywords

Data Auditing for Intelligent Network Security Monitoring

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.003.2200046

Abstract: Data auditing is a process to consistently keep the quality of data high, but this process is generally missing in network security monitoring. When network-based intrusion detection systems catch any suspicious packet, they generate alert… read more here.

Keywords: network; security; security monitoring; network security ... See more keywords

Intelligent Network Security Monitoring Based on Optimum-Path Forest Clustering

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Network"

DOI: 10.1109/mnet.2018.1800151

Abstract: Distinguishing outliers from normal data in wireless sensor networks has been a big challenge in the anomaly detection domain, mostly due to the nature of the anomalies, such as software or hardware failures, reading errors… read more here.

Keywords: security monitoring; network security; monitoring based; anomaly detection ... See more keywords

Multi-Agent for Network Security Monitoring and Warning: A Generative AI Solution

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Network"

DOI: 10.1109/mnet.2025.3579001

Abstract: With the development of internet technology, intelligent and covert threat methods, such as zero-day attacks, Advanced Persistent Threats, and ransomware attacks, have emerged in an endless stream, making the network security landscape increasingly complex. In… read more here.

Keywords: monitoring warning; network; security; network security ... See more keywords

Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3082079

Abstract: According to the IEC 62351-7 standard, data collection using network and system management (NSM) can be used to support the security monitoring of the smart grid. In this article, an NSM security monitoring platform for… read more here.

Keywords: system; network; iec; iec 62351 ... See more keywords

Data-Driven Transient Stability Boundary Generation for Online Security Monitoring

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Power Systems"

DOI: 10.1109/tpwrs.2020.3042210

Abstract: Transient stability boundary (TSB) is an important tool in power system online security monitoring, but practically it suffers from high computational burden using state-of-the-art methods, such as time-domain simulation (TDS), with numerous scenarios taken into… read more here.

Keywords: security monitoring; stability boundary; online security; transient stability ... See more keywords

TrustGuard: Standalone FPGA-Based Security Monitoring Through Power Side-Channel

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2023.3335876

Abstract: The Internet-of-Thing (IoT) era inspires a surge of networked embedded devices in the real world. However, cyber-attacks such as malware intrusions pose severe concerns about the security of the entire IoT space by hijacking the… read more here.

Keywords: side channel; security; fpga; power ... See more keywords

Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14090250

Abstract: The Internet of Things (IoT) has rapidly progressed in recent years and immensely influenced many industries in how they operate. Consequently, IoT technology has improved productivity in many sectors, and smart farming has also hugely… read more here.

Keywords: cloud; security; internet things; security monitoring ... See more keywords

Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring

Sign Up to like & get
recommendations!
Published in 2021 at "Symmetry"

DOI: 10.3390/sym13122425

Abstract: Modern cyber-physical systems (CPS) use digital control of physical processes. This allows attackers to conduct various cyberattacks on these systems. According to the current trends, an information security monitoring system (ISMS) becomes part of a… read more here.

Keywords: information security; security; cps; security monitoring ... See more keywords