Auflistung Nach Schlagwort "Security approach"
Anzeige der Dokumente 1-2 von 2
-
Anomaly detection in IoT devices via monitoring of supply current
(2018)This work presents a methodology that correlates the supply current of a smart device to its functional characteristics in order to detect a manufacturing or a security anomaly in IoT devices. It is proven that awareness ... -
Voice interactive personalized security (VoIPSEC) protocol: Fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification
(2006)Secure end-to-end information exchange is a constant challenge in electronic communications. Novel security architectures and approaches are proposed constantly, to be followed by announcements of sophisticated attack ...