Academic literature on the topic 'Unauthorised access'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unauthorised access.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Unauthorised access"
Bainbridge, David I. "Hacking-The Unauthorised Access of Computer Systems; the Legal Implications." Modern Law Review 52, no. 2 (March 1989): 236–45. http://dx.doi.org/10.1111/j.1468-2230.1989.tb02820.x.
Full textPeady, C. "Unauthorised access to the contents of a Graseby 3300 PCA pump." Anaesthesia 62, no. 1 (January 2007): 98–99. http://dx.doi.org/10.1111/j.1365-2044.2006.04929_1.x.
Full textOsagie, M. S. U., and Amenze Joy Osagie. "A Bit of Hacking Techniques for Vulnerable Subdomain." Journal of Advances in Computing, Communications and Information Technology 1 (April 25, 2021): 1–7. http://dx.doi.org/10.37121/jaccit.v1.133.
Full textKachaeva, G. I., A. D. Popov, and E. A. Rogozin. "FUNCTIONAL PERFORMANCE INDICATORS DURING SYSTEMS DEVELOPMENT TO PROTECT INFORMATION FROM UNAUTHORISED ACCESS." Herald of Dagestan State Technical University. Technical Sciences 45, no. 1 (June 13, 2018): 147–59. http://dx.doi.org/10.21822/2073-6185-2018-45-1-147-159.
Full textTaylor, Savitri. "Should unauthorised arrivals in Australia have free access to advice and assistance?" Australian Journal of Human Rights 6, no. 1 (February 2000): 34–58. http://dx.doi.org/10.1080/1323238x.2000.11911026.
Full textMiller, Shane, Kevin Curran, and Tom Lunney. "Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses." International Journal of Digital Crime and Forensics 13, no. 6 (November 2021): 1–20. http://dx.doi.org/10.4018/ijdcf.20211101.oa8.
Full textMaurushat, Alana, and Ron Yu. "When Internet protocols and legal provisions collide: Unauthorised access and Sierra v. Ritz." Computer Law & Security Review 25, no. 2 (January 2009): 185–88. http://dx.doi.org/10.1016/j.clsr.2009.02.005.
Full textAlferov, V. P., A. V. Butskikh, A. V. Krisilov, A. D. Popov, and E. A. Rogozin. "USE OF A NUMERICAL ANALYTICAL MODEL FOR ASSESSING THE FUNCTIONAL EFFECTIVENESS OF AN INFORMATION PROTECTION SYSTEM BY ANALYSING ITS PROBABILISTIC-TEMPORAL CHARACTERISTICS." Herald of Dagestan State Technical University. Technical Sciences 47, no. 1 (April 21, 2020): 58–71. http://dx.doi.org/10.21822/2073-6185-2020-47-1-58-71.
Full textSelvadurai, Niloufer, Md Rizwanul Islam, and Peter Gillies. "Unauthorised access to wireless local area networks: The limitations of the present Australian laws." Computer Law & Security Review 25, no. 6 (November 2009): 536–42. http://dx.doi.org/10.1016/j.clsr.2009.09.003.
Full textMarrow, Helen B., and Tiffany D. Joseph. "Excluded and Frozen Out: Unauthorised Immigrants’ (Non)Access to Care after US Health Care Reform." Journal of Ethnic and Migration Studies 41, no. 14 (July 17, 2015): 2253–73. http://dx.doi.org/10.1080/1369183x.2015.1051465.
Full textDissertations / Theses on the topic "Unauthorised access"
Steh, Stephen. "Unauthorized access crimes /." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Full textSteh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Full textUzunay, Yusuf. "Design And Implementation Of An Unauthorized Internet Access Blocking System Validating The Source Information In Internet Access Logs." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607628/index.pdf.
Full textHenriksson, Michael. "Authentication and Identification of Sensor Nodes to Avoid Unauthorized Access in Sensor Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279558.
Full textMed en ökad popularitet av att koppla upp sensorer och apparater mot ett nät- verk för att enklare kunna samla in data är säkerhet en aspekt som inte får glömmas bort. När känslig data, så som personlig eller privat data, skickas över nätverket oskyddat kan någon som vill komma åt datan lättare få tag på den. Denna risk ökar med värdet av datan som skickas och en ökningen av säkerhet bör darav följa ökning av värdet på datan. Utav denna anledning är det viktigt att se över säkerheten i sensornätverk och finna lösningar som lätt kan integreras med ett sensornätverk. Detta för att säkerhetsställa att endast de snesornoder som har auktoritet kan gå med i, samt skicka data på nätverket och därmed undvika oönskad åtkomst. Denna avhandling fukuserar på autentisering och identifiering av de noder som ska anslutas till nätverket för att säkerhetsställa att endast pålitliga och auktoriserade noder blir insläppta. Det protokoll som är i fokus i denna avhandling är ZigBee men den föreslagna lösningen kan även integreras med andra protokoll. Den föreslagna lösning- en använder sig även av ett Key Distribution Center (KDC) samt en autentiseringsmetod som baseras på Challenge Handshake Authentication Protocol (CHAP) för att authentisera nya noder innan de blir insläppta i nätverket. Denna lösning är säker och relativt enkel vilket gör det enkelt att integrera med all typer av sensornätverk.
Ribeiro, Sérgio Luiz de Almeida. "Habeas data e tutela jurisdicional da privacidade: aspectos processuais." Pontifícia Universidade Católica de São Paulo, 2013. https://tede2.pucsp.br/handle/handle/6222.
Full textThis dissertation is about the habeas data and its procedural aspects, as a mean to protect privacy. The main objective of this study is to analyze the usefulness of this feature as a specific instrument for protection of individuals' privacy, as well as to ensure that citizens may control the wrongful use of their personal data through social networks and credit protection institutions. In this sense, the habeas data would not be restricted to obtaining general information or rectifying data before public authorities and private companies. In order to achieve this purpose, and based on the deductive method and bibliographical research, the following topics have been addressed in this paper: historical aspects, concept and objetive of the habeas data, proceedings upon habeas data under Law 9507/1997, and, lastly, controversial aspects on habeas data. As a conclusion, the main criticism developed herein is related to the comparison between the habeas data and the writ of mandamus, which has caused a procedural impact on the Law 9507/97. This Law, that rules the habeas data, changed the primary constitutional objective of it, which was very much related to the protection of privacy and the proceedings to achieve this objective. Another criticism that is addressed herein is related to the rule that imposes to the parties the burden of having an entire administrative process before making use of the habeas data to obtain information or rectify personal data. In theory, this rule refrains the habeas data to become an effective instrument for the avoidance of damages to individuals' privacy caused by credit protection institutions and social networks, for instance
Versa a presente dissertação sobre o instituto do habeas data como tutela jurisdicional da intimidade e seus aspectos processuais. O principal objetivo é analisar a utilidade do referido instituto como instrumento específico de proteção da vida íntima e evidenciar a possibilidade de o indivíduo exercer preventivamente o controle do manuseio indevido de dados pessoais por entidades mantenedoras de bancos dados, como é o caso de redes sociais e órgãos de proteção ao crédito, não se restringindo apenas ao meio processual para obter e/ou retificar informações em entidades mantenedoras de bancos dados, públicas e privadas de caráter público. Para atingir esse propósito, e com o suporte metodológico da abordagem dedutiva e da técnica de pesquisa bibliográfica, os seguintes assuntos foram abordados: aspectos históricos, conceito e escopo do habeas data, o procedimento da ação de habeas data na disciplina da Lei nº 9.507/1997 e, por último, as questões ainda controvertidas acerca do referido instituto. A título de conclusão, a principal crítica que emerge do tema analisado alude à comparação do habeas data ao mandado de segurança, que repercutiu no procedimento adotado por sua norma específica (Lei nº 9.507/1997), afastando assim este remédio constitucional da sua finalidade precípua, qual seja, preservar objetivamente a vida íntima e servir como instrumento processual específico para esse fim. Outra crítica se refere à exigência de o jurisdicionado trilhar e esgotar toda a via administrativa antes de se socorrer do Judiciário, por meio do habeas data, para obtenção de informações e/ou retificação de dados incorretos a seu respeito. Em rigor, tal exigência impede que o habeas data seja instrumento eficaz na prevenção de danos da vida privada perpetrados por órgãos de proteção ao crédito e redes sociais, por exemplo
Hasan, Mahmudul. "Cybersecurity Planning Insight: CSCD (Cyber Security and Cyber Defense) Control: Framework For Strategic Direction and Governance." Master's thesis, 2021. http://hdl.handle.net/10362/126392.
Full textIn this recent time, the importance of cybersecurity and cyber defense is sky-high. Everyone uses different devices, IT infrastructures, and applications for various purposes at school, office, home, hospitals everywhere. With the enlightenment of technology, the nature of cyber-attack has been changed dramatically, and that is why the number of cyber-attacks have been increased. Enterprises face billions of Euros loss from such incidents; even the data loss and operational hazard may have a devastating impact not only on the service, security, privacy, brand image but also upon overall business. A constrictive and realistic CSCD (cyber security and cyber defense) strategy along with the proper implementation of it, can safeguard the enterprises and strongly from cyber attacks. In this paper, we prepare an improved CSCD control framework based on several hundreds of scientific papers and frameworks. Moreover, we identify different aspects and strategic elements by holistic CSCD control risk assessment and data analysis for preparing CSCD strategy and planning of different levels of organizations to maintain effective CSCD governance and cyber resilience.
CHAN, CHIH-YU, and 詹智宇. "Encrypted NFC Tags for Preventing Unauthorized Access." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/42881402291982139659.
Full text國立臺灣科技大學
電機工程系
101
NFC (Near Field Communication) refers to a standards-based connectivity technology, is an extension of existing RFID (Radio Frequency Identification) standards. NFC technology provides wireless connectivity in close proximity, enabling communication and data transfer between electronic devices. Given the inherent security of transmission over short distances and its fairly intuitive operation, NFC technology is extensively used in access control, ticketing, electronic payment and device pairing. With increasing use of NFC applications, security issues have become more serious. In particular, the “Passive Tag” has no CPU to establish a secure channel by performing encryption. Currently, no significant mechanisms for protecting sensitive data stored in tags. This study, a security mechanism is proposed for preventing unauthorized access. Encryption and decryption functions are implemented on an Android smartphone application to store encrypted data in NFC tags. Malicious attackers see only unreadable and unrecognizable “Cipher text” from NFC tags when gain unauthorized access. Therefore, the proposed security mechanism can be used to secure personal data in NFC tags. Measurements made using a currently available Android smart phone reveal that, 700bytes of data can be encrypted/decrypted by AES Encryption in less than 20ms, and that 32bytes of data can be encrypted/decrypted by RSA encryption/decryption in less than 140ms. The data can be compressed using Huffman coding before they are stored in NFC Tags. 700bytes of uncompressed data can be compressed to 400bytes. The time for Tag access is also reduced.
Ulrich, Neil. "Wetgewing teen elektroniese betreding." Diss., 1998. http://hdl.handle.net/10500/16234.
Full textParralel met die snelle groei van rekenaartegnologie en die groteiwordende rol wat rekenaars in ans alledaagse lewe speel, is daar ongelukkig 'n toename in die misbruik van rekenaars. Benewens die wyses om rekenaarmisbruik by wyse van remedies in die siviele reg aan te spreek, is dit hoofsaaklik die taak van die strafreg om sodanige misbruik te kriminaliseer en deur middel van straf sulke misbruik te voorkom en oortreders af te skrik. Uit 'n ontleding van die Suid-Afrikaanse strafreg het dit geblyk dat bestaande misdrywe, beide gemeenregtelik en statuter, nie voldoende rekenaarmisbruik kan kriminaliseer en aanspreek nie. Wetgewing blyk die mees gepaste optossing te wees. Uit 'n regsvergelykende studie van die hantering van rekenaarmisbruik in jurisdiksies waar die wetgewer verskillende benaderings toegepas het, het dit geblyk dat die mees gepaste wyse om rekenaarmisbruik te kriminaliseer sal wees om ongemagtigde rekenaarbetreding as moedermisdaad te bestraf aangesien dit die fondament is waarop enige verdere misbruik van 'n rekenaar gebaseer word. Daarbenewens moet verdere meer spesifieke misbruikshandelinge wyd omskryfword as misdrywe, ten opsigte van meer emstige misbruik na betreding van 'n rekenaar
Parallel with the growth in computer technology and increasing use of computers, there has been an increase in computer misuse. In addition to addressing different methods of computer misuse in terms of civil law remedies, it is mainly the task of the criminal law to criminalise such misuse, prevent computer misuse and deter offenders by means of punishment. It was clear from a study of South African criminal law that existing offences, both statutory and in terms of the common law, do not criminalise and address computer misuse effectively. It therefore seems that legislation would be the most appropriate solution. It appeared from a comparative study of jurisdictions where legislators approach computer misuse differently, that the most effective way of criminalising computer misuse would be to criminalise una1,1thorised computer accessing as basic offence. In addition thereto more specific further acts of serious computer misuse, defined broadly, should be criminalised
Criminal & Procedural Law
LL.M. (Criminal & Procedural Law)
TSAI, CHENG-YU, and 蔡承宇. "Access Control Mechanism for Preventing Images from being Unauthorized Access by Screenshots." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/85fft4.
Full text中華大學
資訊管理學系
106
This study is mainly to protect the image when the image was captured by using the screenshot. The user needs to have the authority to access the image. The mechanism proposed in this study avoids intentional people to attempt illegal use of copyright pictures and protect the rights of copyright holders. Therefore, this paper will study how to prevent the image being access by non-copyrights owner. When the user opens the browser, system will check the identity at first. If the identity is the copyright owner, the user will be accesses the copyright image on the webpage by using screenshot successfully. Otherwise, if the non-copyright owner wants to use the screenshot to obtain the copyright image of the other person on the webpage, the copyright image will be turn into a black image according to the proposed mechanism. The proposed mechanism protects images from being accessed by non-copyrights. In order to avoid the illegal use of images ahead, rather than relying on the copyright of the images to claim illegal users compensate by taking legal means after illegal use. Finally, users can access the images with legal permissions through access control, and make the images have more completed protection.
Chih, Nien-Wen, and 職念文. "Prevent Enterprise Resources from Unauthorized Access Using Microsoft IPSec Solution." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/8pg7fu.
Full text世新大學
資訊管理學研究所(含碩專班)
97
The issues of information security can not be solved by using only one single technology of anti-virus, anti-hacking, intrusion detection, and firewall implementation for the past decade. The applications of network developed quickly to make the scope of information security more complex and varied in short years. The information security becomes very important in the industry as well. Therefore, the information security begins to be split into different categories, directions, and levels. The unauthorized inbound connection protection is a part of the information security. The most of LANs in corporation can not provide unauthorized inbound connection protection by using single firewall strategy. The unauthorized inbound connection protection consists of wired connection, wireless connection, remote access connection…etc. The most of technologies and methodologies regarding to unauthorized users in corporation don’t focus on visitors accessing network resources through internal network. The most of current network technologies provide the isolated physical connections or the separated networks using Ethernet switches for the issues of unauthorized access caused by the visitors from outside of corporation. There is a small amount of theses and discourses discuss about the software-based protection mechanism for visitor unauthorized access protection. The IPSec protocol usually applies to layer 2 encryption of VPN, such as L2TP based on Layer 2 Forwarding and establishing secure tunnel and transport mode. This thesis proposes operating system built-in IPSec to be the base of networking operation. Using IPSec software-based technology achieves the discussion of feasibility study for visitor unauthorized access protection. In order to set the scope of access, IPSec transport mode will be used to discuss on operation in corporation.
Books on the topic "Unauthorised access"
Unauthorised access: Physical penetration testing for IT security teams. Chichester, West Sussex, U.K: Wiley, 2009.
Find full textCommission, South African Law. Computer-related crime: Preliminary proposal for reform in respect of unauthorised access to computers, unauthorised modification of computer data and software applications and related procedural aspects. [Pretoria: The Commission, 2001.
Find full textWoodward, Melanie. Construction of a honeypot to monitor unauthorised systems access and the role of a honeypot as a part of a business security solution. Oxford: Oxford Brookes University, 2002.
Find full textRights, United States Congress House Committee on the Judiciary Subcommittee on Civil and Constitutional. Unauthorized access to individual medical records: Hearing before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, Ninety-eighth Congress, second session, on H.R. 5831 ... August 9, 1984. Washington: U.S. G.P.O., 1986.
Find full textUnited States. Congress. Senate. A bill to provide individuals with access to health information of which they are a subject, ensure personal privacy with respect to health-care-related information, impose criminal and civil penalties for unauthorized use of protected health information, to provide for the strong enforcement of these rights, and to protect States' rights. Washington, D.C: U.S. G.P.O., 1999.
Find full textAllsopp, Wil. Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2010.
Find full textAllsopp, Wil. Unauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2009.
Find full textUnauthorised Access: Physical Penetration Testing for IT Security Teams. Wiley & Sons, Incorporated, John, 2010.
Find full textCommission, South African Law, ed. Computer related crime: Options for reform in respect of unauthorised access to computers, unauthorised modification of computer data, and software applications and related procedural aspects. [Pretoria]: The Commission, 1998.
Find full textBook chapters on the topic "Unauthorised access"
Maurushat, Alana. "Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions." In SpringerBriefs in Cybersecurity, 35–52. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5004-6_4.
Full textChawki, Mohamed, Ashraf Darwish, Mohammad Ayoub Khan, and Sapna Tyagi. "Unauthorized Access Offences in Cyberworld." In Studies in Computational Intelligence, 27–37. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15150-2_2.
Full textXia, Haidong, and José Brustoloni. "Detecting and Blocking Unauthorized Access in Wi-Fi Networks." In Lecture Notes in Computer Science, 795–806. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24693-0_65.
Full textKim, Hyuncheol, Sunghae Kim, Seongjin Ahn, and Jinwook Chung. "A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability." In Lecture Notes in Computer Science, 635–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30141-7_93.
Full textRayani, Praveen Kumar, and Suvamoy Changder. "Continuous Gait Authentication Against Unauthorized Smartphone Access Through Naïve Bayes Classifier." In Intelligent Computing and Communication, 799–808. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1084-7_78.
Full textShumilina, Vera, and Elena Tetunashvili. "INFORMATION SECURITY AS A COMPONENT OF THE ECONOMIC SECURITY OF THE ENTERPRISE." In Business security management in modern conditions, 119–29. au: AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635b4a2f5.44169199.
Full textKim, Duhoe, Doyeon Kim, Dongil Shin, Dongkyoo Shin, and Yong-Hyun Kim. "Cyber Battle Damage Assessment Framework and Detection of Unauthorized Wireless Access Point Using Machine Learning." In Lecture Notes in Electrical Engineering, 510–19. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3648-5_59.
Full textKocabas, Huzeyfe, Swapnil Nandy, Tanjina Tamanna, and Mahdi Nasrullah Al-Ameen. "Understanding User’s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account." In HCI for Cybersecurity, Privacy and Trust, 310–25. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77392-2_20.
Full textCurran, Kevin, Peter Breslin, Kevin McLaughlin, and Gary Tracey. "Hackers, Hacking, and Eavesdropping." In Encyclopedia of Internet Technologies and Applications, 199–204. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59140-993-9.ch029.
Full textSloan, Robert H., and Richard Warner. "Introduction." In Unauthorized Access, 1–12. CRC Press, 2016. http://dx.doi.org/10.1201/b15148-1.
Full textConference papers on the topic "Unauthorised access"
Sansurooah, Krishnun, Patryk Szewczyk, and Dan Blackman. "Unauthorised Wireless Network Access Attempts in Western Australia." In 2016 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2016. http://dx.doi.org/10.1109/csci.2016.0191.
Full textAlmehmadi, Abdulaziz, and Khalil El-Khatib. "Authorized! access denied, unauthorized! access granted." In the 6th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2523514.2523612.
Full textKitova, E. T., N. I. Gorlov, and I. V. Bogachkov. "Unauthorized Access Monitoring in Optical Access Networks." In 2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). IEEE, 2020. http://dx.doi.org/10.1109/synchroinfo49631.2020.9166039.
Full textDing, Han, Jinsong Han, Yanyong Zhang, Fu Xiao, Wei Xi, Ge Wang, and Zhiping Jiang. "Preventing Unauthorized Access on Passive Tags." In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. IEEE, 2018. http://dx.doi.org/10.1109/infocom.2018.8486424.
Full textTascini, Guido, Antonella Carbonaro, and Primo Zingaretti. "Unauthorized access identification in restricted areas." In Aerospace/Defense Sensing and Controls, edited by Jacques G. Verly. SPIE, 1998. http://dx.doi.org/10.1117/12.317481.
Full textLiu, Yutong, Linghe Kong, Yifeng Cao, Vahan Sarafian, Long Cheng, and Guihai Chen. "Stop Unauthorized Access to Your Smart Devices." In 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2018. http://dx.doi.org/10.1109/padsw.2018.8644559.
Full textSarumi, Jerry A. "A Review of Encryption Methods for Secure Data Communication." In Advances in Multidisciplinary and Scientific Research Journal Publication. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2022. http://dx.doi.org/10.22624/aims/isteams/lasustech2022v30p7.
Full textGharooni, Maryam, Mazdak Zamani, Mehdi Mansourizadeh, and Shahidan Abdullah. "A confidential RFID model to prevent unauthorized access." In 2011 5th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2011. http://dx.doi.org/10.1109/icaict.2011.6110985.
Full textSokolov, Sergey S., Oleg M. Alimov, Lyudmila E. Ivleva, Ekaterina Yu Vartanova, and Vyacheslav G. Burlov. "Using unauthorized access to information based on applets." In 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2018. http://dx.doi.org/10.1109/eiconrus.2018.8317046.
Full textZhukova, Marina N., Vyacheslav V. Zolotarev, Vadim G. Zhukov, and Anastasya S. Polyakova. "Service Robot Security from Unauthorized Access by Connection Control." In 2019 12th International Conference on Developments in eSystems Engineering (DeSE). IEEE, 2019. http://dx.doi.org/10.1109/dese.2019.00102.
Full text