Superconducting Circuit Technology Developments
Communication and information technology have long been supported by semiconductor integrated circuits (ICs), such as complementary metal-oxide semiconductor (CMOS) technology. One of the advantages of CMOS is its high density; the transistor size has become smaller year by year, following Moore's law. However, CMOS technology is approaching the limit of physical miniaturization and, in turn, the limit at which switching energy can be reduced through scaling.
Cybersecurity Fortification in Edge Computing
Edge computing has emerged as a pivotal paradigm in the IoT and distributed computing era, bringing computation closer to data sources for improved latency and efficiency. However, the ubiquity of edge devices also exposes them to an increased risk of cyber threats, making cybersecurity a paramount concern.
Unlocking a New Security Solution for IoT Applications
Internet-of-Things (IoT) applications involve many interconnected devices performing predefined tasks. Sophisticated cyber-attacks on IoT applications are often launched when malicious entities gather enough information about the characteristics and operations of the network and the connected devices. Different security mechanisms are put in place to protect the information exchange between the devices. In most cases, when the IoT applications are deployed, a static network topology and configuration are used.
Looking at 5G Opportunities and Risks
5G is transforming telecommunication networks and stimulating innovation across different sectors. 5G wireless networks can provide very high data rates and excellent coverage with increased capacity, better quality, and low latency.
A Review of Cyber-Physical Systems Security
Cyber-physical systems (CPS) integrate physical systems in the real world and control software in computing systems. According to researchers, the introduction of networking technologies in CPS has substantial advantages in system efficiency, scalability, and maintenance.
Exploring Cybersecurity for Electric Vehicles
With the development of networking technology for the Internet of Vehicles (IoV), there are opportunities for persistent and dangerous cyber-attacks. If these threats are not detected (especially for safety-critical applications), they can lead to catastrophic failure and substantial economic loss.
Next Front for Computer Security: Machine Learning
As machine learning security emerges, IEEE spoke with Gary McGraw, the “father of software security,” about the opportunities as the field expands.
Taking the Frauds Out of Online Dating
Online dating fraud can cause both psychological and financial harm. Using machine learning, researchers are detecting fake profiles automatically.
Fueling the Fourth Industrial Revolution
The Fourth Industrial Revolution is upon us, and IEEE is leading the way. Learn more about key technologies that will change the way we live in this new era and how IEEE research is fostering innovation and education in these fields.