The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper it is considered Internet of Things with large number of nodes via example applications in house automation, smart grid, environmental, automotive, smart traffic, and eHealth areas. The aim of this paper is to present security analysis and metrics development model for a Wireless Sensor Networks (WSN) - Mobile Cellular Network (MCN) based router. The analysis of the scenarios highlighted...
The Internet of Things (IoT) is assumed to be an integrated part of Future Internet. IoT can be regarded as an extension of the existing interaction between humans and applications through the new dimension of “Things” communication and integration. IoT networks in the scale of million nodes are possible even today but managing the nodes and information provided by large networks beyond that scale...
Measuring and evaluating cyber security is of primary importance in IT systems. The fundamental need to assess security choices validity and effectiveness is growing. One of the main accepted approaches to this problem is a standardized offline security assurance evaluation. But, this method is static, time consuming and does not scale well to complex and dynamic Telco systems. As such, it does not...
This paper presents an empirical analysis of security and user experience issues in cloud computing. The study is based on the assumption that superior user experience and user-centric security are the two crucial issues that help to build an overall experience for the cloud service user. Qualitative research analysis is used to collect perspectives of eleven experts from Finnish Cloud Software Program...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.