Archives: IEEE Whitepapers

Mobile and Transportable Energy Storage Systems: Business Case and Benchmark Analysis

An innovative approach to conventional portable and emergency gensets involves the use of mobile energy storage systems (MESS) and transportable energy storage systems (TESS), offering clean and noise-free alternative solutions. While enhancing grid reliability and resilience remains a critical objective in MESS/TESS deployment, it is equally important to assess the…

Access Article


Hardware Security Attack Landscape and Countermeasures

An overview is given of attacks on hardware security by introducing the four attack classes: logical attacks, physical observative attacks, physical fault injection attacks, and physical manipulative attacks. Descriptions and examples are given for each class of attack. Additionally, typical countermeasures for products to prevent successful attacks are listed and…

Access Article


Corporate Digital Responsibility (CDR) Securing Our Digital Futures

In recognition of the complexities facing organizational leaders in navigating responsibility across the social, economic, and environmental (physical and digital) domains, corporate digital responsibility (CDR) is a method to assist evidence-based decision-making processes. Furthermore, few organizations possess the skills, knowledge, or resources to implement a coherent process or policy to…

Access Article


The Development of The Trusted Digital Identity Industry In Future Networks

The Development of The Trusted Digital Identity Industry In Future Networks

The historical development of information and communication network identity, as well as insights into network identity technologies, applications, and industry trends are reviewed in this report. Current approaches to implementing digital identity in future networks are outlined, and definitions and key metrics for trustworthy digital identities in future networks are…

Access Article


XR Ethics in War, Conflict, and Defense

XR Ethics in War, Conflict, and Defense

The scope of this report is the exploration of ethics-related issues to support the development, design, and deployment of XR applications in the war, conflict, and defense domain and the aim is to initiate expert-driven, multidiscipline analysis of the evolving XR Ethics requirements, with a vision to propose solutions, technologies,…

Access Article


Low-Latency Communication White Paper

This white paper is to inform users and IEEE 802 working groups on the applications and requirements for low latency communications. Low latency is challenging to implement in wired or wireless networks. Some wireless applications are located in physical environments over which the operator/owner can exert control in unlicensed and…

Access Article


A Framework for Human Decision-Making through the Lifecycle of Autonomous and Intelligent Systems in Defense Applications

The framework set out in this document is intended to help inform a range of stakeholders involved in various types of decision-making related to autonomous and intelligent systems (AIS), especially in the military context. The framework provides a granular means for identifying the technical considerations that are necessary to meet…

Access Article


Simulation, Testing, Verification, and Validation (STV2) of Autonomous Driving

STV2 is a set of processes that support the development, validation, and operation of autonomous driving systems from the perspectives of safety and cost. The scope, architecture, and critical components of STV2, as well as how the full lifecycle of autonomous driving systems is covered, is presented in this white…

Access Article


Stabilizing Qubits with Dynamic Frequencies, the Implications on Post-Quantum Encryption Protocols, and A Hybrid Quantum Internet

The paper discusses how stabilized qubits can impact encryption methods, such as quantum key distribution (QKD) and Quantum Elliptical Curve Cryptography (QECC), by enhancing computational integrity and error rates. However, the ability to stabilize qubits also introduces potential risks, as it may lead to vulnerabilities in quantum cryptographic systems if…

Access Article


Subscribe to our Newsletter

Sign up for our monthly newsletter to learn about new developments, including resources, insights and more.