Skip Content
You are currently on the new version of our website. Access the old version .

4 Results Found

  • Article
  • Open Access
35 Citations
4,698 Views
24 Pages

A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT

  • Carlos D. Morales-Molina,
  • Aldo Hernandez-Suarez,
  • Gabriel Sanchez-Perez,
  • Linda K. Toscano-Medina,
  • Hector Perez-Meana,
  • Jesus Olivares-Mercado,
  • Jose Portillo-Portillo,
  • Victor Sanchez and
  • Luis Javier Garcia-Villalba

3 May 2021

At present, new data sharing technologies, such as those used in the Internet of Things (IoT) paradigm, are being extensively adopted. For this reason, intelligent security controls have become imperative. According to good practices and security inf...

  • Article
  • Open Access
9 Citations
8,893 Views
16 Pages

10 June 2015

To log in to a mobile social network service (SNS) server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created...

  • Article
  • Open Access
10 Citations
7,799 Views
27 Pages

24 September 2021

The development of the wireless sensor networks technology commonly named WSNs has been gaining a significantly increased amount of attention from researchers over the last few decades. Its large number of sensor nodes is one of the features that mak...

  • Article
  • Open Access
6 Citations
4,052 Views
16 Pages

New Security Improvements in Next-Generation Passive Optical Networks Stage 2

  • Vlastimil Clupek,
  • Tomas Horvath,
  • Petr Munster and
  • Vaclav Oujezsky

18 October 2019

Passive optical networks are currently the most promising solution for access networks. These networks rely on broadcast signal distribution in the downstream direction and unicast signal transmission in the upstream direction. The upstream direction...