All Stories

  1. WebShield 5.0: Harnessing AI and NLP to combat web threats in Industry 5.0
  2. Toward a Unified Understanding of Cyber Resilience: Concepts, Strategies, and Future Directions
  3. ParsEval: Evaluation of Parsing Behavior using Real-world Out-in-the-wild X.509 Certificates
  4. Securing industry 5.0 using 6σ CYBERNETIC framework
  5. Cybersecurity as a Service
  6. A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations
  7. Decision-Based Routing for Unmanned Aerial Vehicles and Internet of Things Networks
  8. Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review
  9. A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning
  10. Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them
  11. Enabling secure time-series data sharing via homomorphic encryption in cloud-assisted IIoT
  12. SoK: Context and Risk Aware Access Control for Zero Trust Systems
  13. A Simulated and Experimental Analysis of Evaporation Duct Effects on Microwave Communications in the Irish Sea
  14. Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT
  15. SmartCrypt: Secure Storing and Sharing of Time Series Data Streams in IIoT
  16. Middleware Application, Suitable to Build an Automated and Connected Smart Manufacturing Environment
  17. The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment
  18. Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap
  19. Hybrid Cloud SLAs for Industry 4.0: Bridging the Gap
  20. Integration of an MES and AIV Using a LabVIEW Middleware Scheduler Suitable for Use in Industry 4.0 Applications
  21. Challenges Associated with Implementing 5G in Manufacturing
  22. Hybrid Multi-Cloud Demystifying SLAs for Smart City Enterprises Using IoT Applications
  23. A comparitive study of Image Filters and Machine Learning for use in Machined Part Recognition
  24. An Overview of Popular Digital Image Processing Filtering Operations
  25. An Experimental Study of the Effects of the Evaporation Duct on Microwave Propagation
  26. LabVIEW-FPGA based implementation of an Authenticated Encryption core
  27. Real-Time Secure/Unsecure Video Latency Measurement/Analysis with FPGA-Based Bump-in-the-Wire Security
  28. Special Issue: Technological Advancements in Wireless and Optical Communication Systems
  29. Integration of autonomous intelligent vehicles into manufacturing environments: Challenges
  30. Object recognition within smart manufacturing
  31. Remote acoustic analysis for tool condition monitoring
  32. Real-Time Video Latency Measurement between a Robot and Its Remote Control Station: Causes and Mitigation
  33. Automated Ground Vehicle (AGV) and Sensor Technologies- A Review
  34. Can IoT escape Cloud QoS and Cost Pitfalls
  35. Future Proofing IoT Embedded Platforms for Cryptographic Primitives Support
  36. Stereo Vision Sensing: Review of existing systems
  37. ICST 2018 Welcome Message
  38. Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions
  39. An Efficient High Speed AES Implementation Using Traditional FPGA and LabVIEW FPGA Platforms
  40. Federated Hybrid Clouds Service Level Agreements and Legal Issues
  41. High Bandwidth Maritime Communication Systems – Review of Existing Solutions and New Proposals
  42. Hybrid Cloud Computing QoS Glitches
  43. Motion artefact minimization from photoplethysmography based non-invasive hemoglobin sensor based on an envelope filtering algorithm
  44. Bump in the wire (BITW) security solution for a marine ROV remote control application
  45. An efficient implementation of FPGA based high speed IPSec (AH/ESP) core
  46. Bloom filter–based efficient broadcast algorithm for the Internet of things
  47. Cloud computing and Internet of Things fusion: Cost issues
  48. Medical IoT systems: architecture and security
  49. A secure end-to-end IoT solution
  50. Advances in Security in Computing and Communications
  51. Underwater Depth and Temperature Sensing Based on Fiber Optic Technology for Marine and Fresh Water Applications
  52. Cluster head election and rotation for medical-based wireless sensor networks
  53. Reconfiguration of neighbouring nodes in coastal monitoring wireless sensor networks based on leader node recommendation
  54. Inspection-Class Remotely Operated Vehicles—A Review
  55. An Experimental Study of the Effects of External Physiological Parameters on the Photoplethysmography Signals in the Context of Local Blood Pressure (Hydrostatic Pressure Changes)
  56. An Optical Fibre Depth (Pressure) Sensor for Remote Operated Vehicles in Underwater Applications
  57. Bloom filter based data collection algorithm for wireless sensor networks
  58. Tenant - Vendor and Third-Party Agreements for the Cloud: Considerations for Security Provision
  59. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks
  60. Foreword by Guest Editors for the Special Issue on the 2016 Global Conference on Wireless and Optical Communications (GCWOC’16)
  61. An FPGA based reconfigurable IPSec ESP core suitable for IoT applications
  62. Memory storage administration of security encryption keys for line topology in maritime wireless sensor networks
  63. Review and evaluation of WSN simulation tools in a cloud based environment
  64. Efficient and High Speed FPGA Bump in the Wire Implementation for Data Integrity and Confidentiality Services in the IoT
  65. Trust security mechanism for maritime wireless sensor networks
  66. Logboat — A simulation framework enabling CAN security assessments
  67. An FPGA-based reconfigurable IPSec AH core with efficient implementation of SHA-3 for high speed IoT applications
  68. High Speed Implementation of a SHA-3 Core on Virtex-5 and Virtex-6 FPGAs
  69. Optical fibre multi-parameter sensing with secure cloud based signal capture and processing
  70. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT
  71. AES implementation on Xilinx FPGAs suitable for FPGA based WBSNs
  72. Medical WSN: Defense for selective forwarding attack
  73. Trust Security Mechanism for Marine Wireless Sensor Networks
  74. FPGA Based Real Time 'Secure' Body Temperature Monitoring Suitable for WBSN
  75. FPGA Based Reconfigurable IPSec AH Core Suitable for IoT Applications
  76. An optical fibre sensor for combined point pressure measurement and spatially resolved temperature measurement
  77. Healthcare WSN: Cluster Elections and Selective Forwarding Defense
  78. Medical WSN: Power, routing and selective forwarding defense
  79. Optical fiber pressure sensors based on Extrinsic Fabry Perot Interferometer (EFPI) for the depth control in marine environment
  80. Novel miniature pressure and temperature optical fibre sensor based on an extrinsic Fabry-Perot Interferometer (EFPI) and Fibre Bragg Gratings (FBG) for the Ocean environment
  81. Efficient High Speed Implementation of Secure Hash Algorithm-3 on Virtex-5 FPGA
  82. Underwater pressure measurement using fibre optic extrinsic Fabry-Perot interferometric (EFPI) sensors
  83. Wireless Sensor Node Hardware
  84. Logically Optimized Smallest FPGA Architecture for SHA- 3 Core
  85. A Lightweight Classification Algorithm for External Sources of Interference in IEEE 802.15.4-Based Wireless Sensor Networks Operating at the 2.4 GHz
  86. A multi-wavelength discriminating sensor with a wireless mote interface for aquatic pollution monitoring
  87. Comparison and overview of Wireless sensor network systems for Medical Applications
  88. Marine based Wireless Sensor Networks: Challenges and Requirements
  89. Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications
  90. A Mote Interface for Fiber Optic Spectral Sensing With Real-Time Monitoring of the Marine Environment
  91. Coexistence measurements and analysis of IEEE 802.15.4 with Wi-Fi and bluetooth for vehicle networks
  92. Development of a discriminating fibre optic sensing array for wireless real time analysis of the maritime environment
  93. 2.4 GHz IEEE 802.15.4 channel interference classification algorithm running live on a sensor node
  94. Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks
  95. Prototype of a secure wireless patient monitoring system for the medical community
  96. Planning with parents for seriously ill children: Preliminary results on the development of the parental engagement scale
  97. Configuration Tool for a Wireless Sensor Network Integrated Security Framework
  98. MArSSeNs: A modular architecture for the security of sensor networks
  99. Low cost hydrocarbon spillage sensor for the marine environment with interfacing to a mote platform
  100. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC
  101. Technologies and Architectures for Multimedia-Support in Wireless Sensor Network
  102. Optical fibre cavity for ring-down experiments with low coupling losses
  103. Towards integrated security for sensor network applications
  104. Large-core fibre-cavity design for ring-down experiments
  105. A novel and scalable key management scheme for wireless sensor networks
  106. Security for Wireless Sensor Networks – Configuration Aid
  107. On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks
  108. Novel passive fibre-cavity design for ring-down experiments using a multimode optical waveguide
  109. Review of platforms and security protocols suitable for wireless sensor networks
  110. Power considerations when using high capacity data storage on wireless sensor motes
  111. Novel multimode fibre-cavity for ring-down experiments
  112. Development of a prototyping platform for the integration of multiple fiber optic sensing devices to a SHIMMER™ system for in-situ maritime monitoring.
  113. A comparative review of wireless sensor network mote technologies
  114. Setting up secure wireless sensor networks
  115. Selection application for platforms and security protocols suitable for wireless sensor networks
  116. A tool for the security configuration of sensor networks
  117. Fibre-optic evanescent-wave field fluid concentration sensor
  118. Security for wireless sensor networks: A review
  119. On the (im)possibility of denial of service attacks exploiting authentication overhead in WSNs
  120. Evaluation of key distribution protocols for use with wireless sensor networks
  121. Wireless Sensor Node hardware: A review
  122. Learning, self-scheduling TDMA (LeSS-TDMA) for sensor networks
  123. Investigation of binary liquid aqueous methanol and ethanol mixtures using meander-shaped fibre-optic evanescent-wave absorption sensors
  124. Learning, self-scheduling TDMA (LeSS-TDMA) for wireless sensor networks
  125. Key exchange protocol for Wireless Sensor Network: Formal verification using CSN modal logic
  126. The Impact of Java and Public Key Cryptography in Wireless Sensor Networking
  127. TDMA Protocol Requirements for Wireless Sensor Networks
  128. SENSORCOMM 2008 Preface
  129. Securing Wireless Sensor Networks: Security Architectures
  130. On the logical verification of a group key agreement protocol for resource constrained mobile devices
  131. Resources Implications for Data Security in Wireless Sensor Network Nodes
  132. On the Formal Verification of the SNEP Key Agreement Protocol for Wireless Sensor Networks
  133. Key handling in wireless sensor networks
  134. Efficiently securing data on a wireless sensor network
  135. Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
  136. Power Management in Operating Systems for Wireless Sensor Nodes
  137. A Survey of Authentication Mechanisms: Authentication for Ad-Hoc Wireless Sensor Networks
  138. Realisation of a minimum-knowledge identification and signature scheme