Security

The deployment of unmanned aerial vehicles (UAV) for logistics and other civil purposes is consistently disrupting airspace security. Consequently, there is a scarcity of robust datasets for the development of real-time systems that can checkmate the incessant deployment of UAVs in carrying out criminal or terrorist activities. VisioDECT is a robust vision-based drone dataset for classifying, detecting, and countering unauthorized drone deployment using visual and electro-optical infra-red detection technologies.

 

Categories:
148 Views

In the digital era of the Industrial Internet of Things (IIoT), the conventional Critical Infrastructures (CIs) are transformed into smart environments with multiple benefits, such as pervasive control, self-monitoring and self-healing. However, this evolution is characterised by several cyberthreats due to the necessary presence of insecure technologies. DNP3 is an industrial communication protocol which is widely adopted in the CIs of the US. In particular, DNP3 allows the remote communication between Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA).

Categories:
84 Views

PUF-Enhanced Processor Design for Image Encryption (datasets).

All the hardware experimental data were collected from 8 equal FPGA development kits and a test manual is included.

Devices: Artix-7 FPGA (XC7A100TCSG324-1). IDE Version: Vivado-2020.1.

Categories:
34 Views

This dataset is in support of my research paper - Short Circuit Analysis of 666 Wh Li-Ion NMC

 Faults and datasets can be copied to submit in fire cause investigation reports or thesis. The simulation is run for 20 hours (72000 seconds) of simulation time for each fault of 100 faults. 

PrePrint : (Make sure you have read Caution.)

Categories:
512 Views

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
Views

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
Views

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
94 Views

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
Views

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
Views

Blockchain technology is widely used in data asset transactions. Especially for the private data of the public, such data cannot be circulated to unauthorized receivers, it is necessary to ensure that the transaction records and data contents can be audited and traced. In this paper, based on bilinear mapping, we construct a triple receiver public key encryption scheme as a regulatable data asset transaction mechanism, and construct a blockchain data asset transaction platform, namely Digital Asset Exchange Protocol.

Categories:
17 Views

Pages