Encyclopedia
Scholarly Community
Encyclopedia
Entry
Video
Image
Journal
Book
News
About
Entry
Entry
Video
Image
Log in/Sign up
Submit
Entry
Video
Image
Subject:
All Disciplines
Arts & Humanities
Biology & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Mathematics
Engineering
Environmental & Earth Sciences
Medicine & Pharmacology
Physical Sciences
Public Health & Healthcare
Social Sciences
Sort:
Hottest
Latest
Alphabetical (A-Z)
Alphabetical (Z-A)
Type:
All
Topic Review
Biography
Topic Review
Seismic Data Query Algorithm
Edge computing can reduce the transmission pressure of wireless networks in earthquakes by pushing computing functionalities to network edges and avoiding the data transmission to cloud servers. This also leads to the scattered storage of data content in each edge server, increasing the difficulty of content search.
244
29 Jun 2023
Topic Review
Seifert–Van Kampen Theorem
In mathematics, the Seifert–van Kampen theorem of algebraic topology (named after Herbert Seifert and Egbert van Kampen), sometimes just called van Kampen's theorem, expresses the structure of the fundamental group of a topological space [math]\displaystyle{ X }[/math] in terms of the fundamental groups of two open, path-connected subspaces that cover [math]\displaystyle{ X }[/math]. It can therefore be used for computations of the fundamental group of spaces that are constructed out of simpler ones.
539
27 Oct 2022
Topic Review
Segmentation of Liver Tumor in Computed Tomography Scan
Segmentation of images is a common task within medical image analysis and a necessary component of medical image segmentation. The segmentation of the liver and liver tumors is an important but challenging stage in screening and diagnosing liver diseases. Many automated techniques have been developed for liver and tumor segmentation; however, segmentation of the liver is still challenging due to the fuzzy & complex background of the liver position with other organs. As a result, creating a considerable automated liver and tumour division from computed tomography (CT) scans is critical for identifying liver cancer.
605
15 Sep 2022
Topic Review
Segmentation and Path Planning of Unmanned Ariel Vehicle
Unmanned aerial vehicles (UAVs), sometimes known as “drones”, are unmanned aircraft that can be flown without a pilot on board. Aircraft, ground control stations, and communications systems all fall under the umbrella term unmanned aircraft systems (UAS), which describes the infrastructure necessary for sophisticated drone operations. An autonomous drone is a UAV that can fly missions independently of a human pilot. It can take off, execute its task, and return to base without human assistance. Rather than relying on a human pilot, communications management software handles mission planning and flight control for autonomous drones.
165
15 Dec 2023
Topic Review
Security Threats for Medical Wearables
In the past few years, “smart” objects and products have given rise to significant progress in industry production and its security. Advances in digitization that have occurred in the industry, combined with internet technologies and future-oriented technologies in the field of so-called “smart” objects (machines and products), have led to a new and fundamental paradigm shift in industrial production and in their security.
369
14 Mar 2022
Topic Review
Security of Transport Layer Security
This article discusses the security of the Transport Layer Security (TLS) internet protocol.
574
17 Oct 2022
Topic Review
Security of the Internet of Things
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate their efforts on system security. Any vulnerability could lead to a system failure or cyberattack, which would have a large-scale impact. With billions of interconnected devices, ensuring robust security measures is crucial to safeguard sensitive data, protect user privacy, and mitigate potential cyber threats. Failure to prioritize IoT security could have far-reaching consequences, jeopardizing individuals, organizations, and even critical infrastructure. IoT security is a protection strategy and defense mechanism that protects against the possibility of cyberattacks that specifically target physically linked IoT devices. IoT security teams are currently dealing with growing difficulties, such as inventories, operations, diversity, ownership, data volume, threats, etc.
402
16 May 2023
Topic Review
Peer Reviewed
Security of Programmable Logic Controllers in Industrial Control Systems
One key role in industrial control systems (ICSs) is known as Programmable Logic Controller (PLC). However, with the development of the Internet of Things (IoT), PLCs have become exposed to an increasing number of attacks, which may cause malfunctions of the whole ICS. Thus, it is necessary to identify potential attacks on PLCs and propose effective solutions to mitigate them. Unfortunately, to date, there have not been significant efforts made to provide a detailed overview of existing works on PLC security. With such a concern in mind, in this paper, we focus on summarising PLC security from different components running at different layers of a PLC architecture. We first review the framework of PLCs; then, we discuss several models when considering PLC security. After that, we provide an overview of existing attacks on PLCs and general solutions to those issues from different perspectives. Lastly, we conclude this paper with an overview of future research areas in PLC security.
345
05 Jun 2024
Topic Review
Security Issues in IoT Software
Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System architects create system blueprints and draw specifications for the software artefacts that are needed; subsequently, either custom-made software is developed according to these specifications and/or ready-made COTS/open source software may be identified and customized to realize the overall system goals. All deployed software however may entail vulnerabilities, either due to insecure coding practices or owing to misconfigurations and unexpected interactions.
336
02 Jun 2023
Topic Review
Security in Wireless Body Sensor Network
Wireless body sensor network (WBSN) is a wireless communication that might enable 24/7 patient monitoring and health findings through the Online platform. Although BSN design is becoming simpler, building a secure BSN seems to be more challenging than designing conventional solutions.
537
08 Oct 2022
Page
of
371
Featured Entry Collections
>>
Featured Books
>>
Encyclopedia of Social Sciences
Chief Editor:
Michael McAleer
Encyclopedia of COVID-19
Chief Editor:
Stephen Bustin
Encyclopedia of Fungi
Chief Editor:
Luis V. Lopez-Llorca
Encyclopedia of Digital Society, Industry 5.0 and Smart City
Chief Editor:
Sandro Serpa
Entry
Video
Image
Journal
Book
News
About
Log in/Sign up
New Entry
New Video
New Images
About
Terms and Conditions
Privacy Policy
Advisory Board
Contact
Partner
Video Production Service
Feedback
Top
Feedback
×
Help Center
Browse our user manual, common Q&A, author guidelines, etc.
Rate your experience
Let us know your experience and what we could improve.
Report an error
Is something wrong? Please let us know!
Other feedback
Other feedback you would like to report.
×
Did you find what you were looking for?
Love
Like
Neutral
Dislike
Hate
0
/500
Email
Do you agree to share your valuable feedback publicly on
Encyclopedia
’s homepage?
Yes, I agree. Encyclopedia can post it.
No, I do not agree. I would not like to post my testimonial.
Webpage
Upload a screenshot
(Max file size 2MB)
Submit
Back
Close
×