ListarIC - Artículos por tema "Seguridad informática"
Mostrando ítems 1-3 de 3
-
A Hybrid Approach for Efficient and Secure Point Multiplication on Binary Edwards Curves.
(MDPI, 2023-05-08)The focus of this article is to present a novel crypto-accelerator architecture for a resource constrained embedded system that utilizes elliptic curve cryptography (ECC). The architecture is built around Binary Edwards ... -
An Extensive Validation of a SIR Epidemic Model to Study the Propagation of Jamming Attacks against IoT Wireless Networks.
(Elsevier, 2019-10-21)This paper describes the utilization of an epidemic approach to study the propagation of jamming attacks, which can affect to different communication layers of all nodes in a variety of Internet of Things (IoT) ... -
PCA filtering and Probabilistic SOM for Network Intrusion Detection.
(Elsevier, 2015-09-21)The growth of the Internet and, consequently, the number of interconnected computers, has exposed significant amounts of information to intruders and attackers. Firewalls aim to detect violations according to a predefined ...