All Stories

  1. CRISP: Cyber-Resilient Intelligent Systems for Predicting Threats in Digital Ecosystems
  2. WebShield 5.0: Harnessing AI and NLP to combat web threats in Industry 5.0
  3. Toward a Unified Understanding of Cyber Resilience: Concepts, Strategies, and Future Directions
  4. ParsEval: Evaluation of Parsing Behavior using Real-world Out-in-the-wild X.509 Certificates
  5. Securing industry 5.0 using 6σ CYBERNETIC framework
  6. Cybersecurity as a Service
  7. A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations
  8. Decision-Based Routing for Unmanned Aerial Vehicles and Internet of Things Networks
  9. Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review
  10. A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning
  11. Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them
  12. Enabling secure time-series data sharing via homomorphic encryption in cloud-assisted IIoT
  13. SoK: Context and Risk Aware Access Control for Zero Trust Systems
  14. A Simulated and Experimental Analysis of Evaporation Duct Effects on Microwave Communications in the Irish Sea
  15. Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT
  16. SmartCrypt: Secure Storing and Sharing of Time Series Data Streams in IIoT
  17. Middleware Application, Suitable to Build an Automated and Connected Smart Manufacturing Environment
  18. The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment
  19. Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap
  20. Hybrid Cloud SLAs for Industry 4.0: Bridging the Gap
  21. Integration of an MES and AIV Using a LabVIEW Middleware Scheduler Suitable for Use in Industry 4.0 Applications
  22. Challenges Associated with Implementing 5G in Manufacturing
  23. Hybrid Multi-Cloud Demystifying SLAs for Smart City Enterprises Using IoT Applications
  24. A comparitive study of Image Filters and Machine Learning for use in Machined Part Recognition
  25. An Overview of Popular Digital Image Processing Filtering Operations
  26. An Experimental Study of the Effects of the Evaporation Duct on Microwave Propagation
  27. LabVIEW-FPGA based implementation of an Authenticated Encryption core
  28. Real-Time Secure/Unsecure Video Latency Measurement/Analysis with FPGA-Based Bump-in-the-Wire Security
  29. Special Issue: Technological Advancements in Wireless and Optical Communication Systems
  30. Integration of autonomous intelligent vehicles into manufacturing environments: Challenges
  31. Object recognition within smart manufacturing
  32. Remote acoustic analysis for tool condition monitoring
  33. Real-Time Video Latency Measurement between a Robot and Its Remote Control Station: Causes and Mitigation
  34. Automated Ground Vehicle (AGV) and Sensor Technologies- A Review
  35. Can IoT escape Cloud QoS and Cost Pitfalls
  36. Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support
  37. Stereo Vision Sensing: Review of existing systems
  38. ICST 2018 Welcome Message
  39. Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions
  40. An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA Platforms
  41. Federated Hybrid Clouds Service Level Agreements and Legal Issues
  42. High Bandwidth Maritime Communication Systems – Review of Existing Solutions and New Proposals
  43. Hybrid Cloud Computing QoS Glitches
  44. Motion artefact minimization from photoplethysmography based non-invasive hemoglobin sensor based on an envelope filtering algorithm
  45. Bump in the wire (BITW) security solution for a marine ROV remote control application
  46. An efficient implementation of FPGA based high speed IPSec (AH/ESP) core
  47. Bloom filter–based efficient broadcast algorithm for the Internet of things
  48. Cloud computing and Internet of Things fusion: Cost issues
  49. Medical IoT systems: architecture and security
  50. A secure end-to-end IoT solution
  51. Advances in Security in Computing and Communications
  52. Underwater Depth and Temperature Sensing Based on Fiber Optic Technology for Marine and Fresh Water Applications
  53. Cluster head election and rotation for medical-based wireless sensor networks
  54. Reconfiguration of neighbouring nodes in coastal monitoring wireless sensor networks based on leader node recommendation
  55. Inspection-Class Remotely Operated Vehicles—A Review
  56. An Experimental Study of the Effects of External Physiological Parameters on the Photoplethysmography Signals in the Context of Local Blood Pressure (Hydrostatic Pressure Changes)
  57. An Optical Fibre Depth (Pressure) Sensor for Remote Operated Vehicles in Underwater Applications
  58. Bloom filter based data collection algorithm for wireless sensor networks
  59. Tenant - Vendor and Third-Party Agreements for the Cloud: Considerations for Security Provision
  60. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks
  61. Foreword by Guest Editors for the Special Issue on the 2016 Global Conference on Wireless and Optical Communications (GCWOC’16)
  62. An FPGA based reconfigurable IPSec ESP core suitable for IoT applications
  63. Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks
  64. Review and evaluation of WSN simulation tools in a cloud based environment
  65. Efficient and High Speed FPGA Bump in the Wire Implementation for Data Integrity and Confidentiality Services in the IoT
  66. Trust security mechanism for maritime wireless sensor networks
  67. Logboat — A simulation framework enabling CAN security assessments
  68. An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications
  69. High Speed Implementation of a SHA-3 Core on Virtex-5 and Virtex-6 FPGAs
  70. Optical fibre multi-parameter sensing with secure cloud based signal capture and processing
  71. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT
  72. AES implementation on Xilinx FPGAs suitable for FPGA based WBSNs
  73. Medical WSN: Defense for selective forwarding attack
  74. Trust Security Mechanism for Marine Wireless Sensor Networks
  75. FPGA Based Real Time 'Secure' Body Temperature Monitoring Suitable for WBSN
  76. FPGA Based Reconfigurable IPSec AH Core Suitable for IoT Applications
  77. An optical fibre sensor for combined point pressure measurement and spatially resolved temperature measurement
  78. Healthcare WSN: Cluster Elections and Selective Forwarding Defense
  79. Medical WSN: Power, routing and selective forwarding defense
  80. Optical fiber pressure sensors based on Extrinsic Fabry Perot Interferometer (EFPI) for the depth control in marine environment
  81. Novel miniature pressure and temperature optical fibre sensor based on an extrinsic Fabry-Perot Interferometer (EFPI) and Fibre Bragg Gratings (FBG) for the Ocean environment
  82. Efficient High Speed Implementation of Secure Hash Algorithm-3 on Virtex-5 FPGA
  83. Underwater pressure measurement using fibre optic extrinsic Fabry-Perot interferometric (EFPI) sensors
  84. Wireless Sensor Node Hardware
  85. Logically Optimized Smallest FPGA Architecture for SHA- 3 Core
  86. A Lightweight Classification Algorithm for External Sources of Interference in IEEE 802.15.4-Based Wireless Sensor Networks Operating at the 2.4 GHz
  87. A multi-wavelength discriminating sensor with a wireless mote interface for aquatic pollution monitoring
  88. Comparison and overview of Wireless sensor network systems for Medical Applications
  89. Marine based Wireless Sensor Networks: Challenges and Requirements
  90. Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications
  91. A Mote Interface for Fiber Optic Spectral Sensing With Real-Time Monitoring of the Marine Environment
  92. Coexistence measurements and analysis of IEEE 802.15.4 with Wi-Fi and bluetooth for vehicle networks
  93. Development of a discriminating fibre optic sensing array for wireless real time analysis of the maritime environment
  94. 2.4 GHz IEEE 802.15.4 channel interference classification algorithm running live on a sensor node
  95. Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks
  96. Prototype of a secure wireless patient monitoring system for the medical community
  97. Planning with parents for seriously ill children: Preliminary results on the development of the parental engagement scale
  98. Configuration Tool for a Wireless Sensor Network Integrated Security Framework
  99. MArSSeNs: A modular architecture for the security of sensor networks
  100. Low cost hydrocarbon spillage sensor for the marine environment with interfacing to a mote platform
  101. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC
  102. Technologies and Architectures for Multimedia-Support in Wireless Sensor Network
  103. Optical fibre cavity for ring-down experiments with low coupling losses
  104. Towards integrated security for sensor network applications
  105. Large-core fibre-cavity design for ring-down experiments
  106. A novel and scalable key management scheme for wireless sensor networks
  107. Security for Wireless Sensor Networks – Configuration Aid
  108. On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks
  109. Novel passive fibre-cavity design for ring-down experiments using a multimode optical waveguide
  110. Review of platforms and security protocols suitable for wireless sensor networks
  111. Power considerations when using high capacity data storage on wireless sensor motes
  112. Novel multimode fibre-cavity for ring-down experiments
  113. Development of a prototyping platform for the integration of multiple fiber optic sensing devices to a SHIMMER™ system for in-situ maritime monitoring.
  114. A comparative review of wireless sensor network mote technologies
  115. Setting up secure wireless sensor networks
  116. Selection application for platforms and security protocols suitable for wireless sensor networks
  117. A tool for the security configuration of sensor networks
  118. Fibre-optic evanescent-wave field fluid concentration sensor
  119. Security for wireless sensor networks: A review
  120. On the (im)possibility of denial of service attacks exploiting authentication overhead in WSNs
  121. Evaluation of key distribution protocols for use with wireless sensor networks
  122. Wireless Sensor Node hardware: A review
  123. Learning, self-scheduling TDMA (LeSS-TDMA) for sensor networks
  124. Investigation of binary liquid aqueous methanol and ethanol mixtures using meander-shaped fibre-optic evanescent-wave absorption sensors
  125. Learning, self-scheduling TDMA (LeSS-TDMA) for wireless sensor networks
  126. Key exchange protocol for Wireless Sensor Network: Formal verification using CSN modal logic
  127. The Impact of Java and Public Key Cryptography in Wireless Sensor Networking
  128. TDMA Protocol Requirements for Wireless Sensor Networks
  129. SENSORCOMM 2008 Preface
  130. Securing Wireless Sensor Networks: Security Architectures
  131. On the logical verification of a group key agreement protocol for resource constrained mobile devices
  132. Resources Implications for Data Security in Wireless Sensor Network Nodes
  133. On the Formal Verification of the SNEP Key Agreement Protocol for Wireless Sensor Networks
  134. Key handling in wireless sensor networks
  135. Efficiently securing data on a wireless sensor network
  136. Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
  137. Power Management in Operating Systems for Wireless Sensor Nodes
  138. A Survey of Authentication Mechanisms: Authentication for Ad-Hoc Wireless Sensor Networks
  139. Realisation of a minimum-knowledge identification and signature scheme