Synthetic biology is a field of biotechnology that is rapidly growing in various applications, such as in medicine, environmental sustainability, and energy production. However these technologies also have unforeseen risks and applications to humans and th ...
DC microgrids often present a hierarchical control architecture, requiring integration of communication layers. This leads to the possibility of malicious attackers disrupting the overall system. Motivated by this application, in this article, we present a ...
Intrusion detection systems are a commonly deployed defense that examines network traffic, host operations, or both to detect attacks. However, more attacks bypass IDS defenses each year, and with the sophistication of attacks increasing as well, we must e ...
This paper presents a real-world application of stochastic programming in the Swiss hydro-based system. The seasonal hydrological conditions may cause insufficient market volume to an extent that security criteria (i.e., the criteria determining of reserve ...
The vulnerability against interference, spoofing, and jamming of GNSS receivers is considered nowadays a major security concern. This security threat is exacerbated with the existing market availability of GPS jamming and spoofing equipment sold at reasona ...
Monitoring traffic events in computer network has become a critical task for operators to maintain an accurate view of a network's condition, to detect emerging security threats, and to safeguard the availability of resources. Conditions detrimental to a n ...
The current business environment has become more risky and variable. In particular, the recent terrorist attacks against western economies have revealed the vulnerability of global supply chains. These events showed that companies that move cargo internati ...
In this paper, we propose a Secure JPEG, an open and flexible standardized framework to secure JPEG images. Its goal is to allow the efficient integration and use of security tools enabling a variety of security services such as confidentiality, integrity ...
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during ...