author: danda b rawat

Smart Cities Cybersecurity and Privacy

... fast authentication for in-motion inductive EV charging, in: Proceedings of ... Wei, M. Yu, An anonymous payment system to protect the privacy of electric ... payment system for electric vehicles, in: Proceedings of the International ...

Cyber-Physical Systems: Foundations, Principles and Applications

... setups and the resulting requirements for action selection, interfaces need to provide guidance through tasks. 3.1. DESIGN. GOAL. F1 ... 2011), the explication of causal patterns (Goldwater and Gentner, 2015) ... F1: Contextualize Information ...

Convergence of Cloud with AI for Big Data Analytics: Foundations and Innovation

... IoT devices. The discussion below explains key characteristics of each model. Device-to-Device (D-to-D) Communication: In this type of communi- cation two or more devices connect ... used in to control home appliances (like smart light bulb, ...

Science and Technologies for Smart Cities: 7th EAI International Conference, SmartCity360°, Virtual Event, December 2-4, 2021, Proceedings

... SonicWall сTZ400 R firewall. A laptop ran the Nmap program for port scanning, while a separate tool called Wireshark analyzed all network packets. See Fig. 4 for the network diagram. Wireshark is a free open source packet analyzer which ...

Cyber-Physical Systems: From Theory to Practice

... change of 4 ;. The coordination process uses two critical charger parameters ... change A of 0 ; for the left slice limit and the change A ... mobile chargers , nodes Efficient Protocols for Wireless Power Transfers in Ad Hoc Networks 543.

Security in Computing and Communications: 8th International Symposium, SSCC 2020, Chennai, India, October 14–17, 2020, Revised Selected Papers

... Android Malware Detection Mechanisms Teenu S. John( B ) and Tony Thomas( B ) Indian Institute of Information Technology and ... Android application is examined. Evading Static and Dynamic Android Malware Detection Mechanisms 1 Introduction.

Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers

... Malwarebytes Anti-ransomware Tool. The product is bundled with the exploit ... malware researcher's system. This prevents the execution of ransomware which ... keys once you make the payment. There are samples such as notpetya, which ...

Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

... mcafee. com/in/resources/solution-briefs/sb-total-protection-for- dlp.pdf ... Text Classification Techniques Used to Facilitate Cyber Terrorism ... Extraction Algorithms for Classification of Text Documents. In: International Conference ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.