The internet of things security: A survey encompassing unexplored areas and new insights
… Enabling easy access to information: One could comfortably access data which is a distance
away in real time. Data access is easy due to a network of connected objects; one gets …
away in real time. Data access is easy due to a network of connected objects; one gets …
[HTML][HTML] Internet of things: Evolution, concerns and security challenges
… protocols have endorsed the concept of the Internet of Things. The core conviction of IoT …
For example, based on real-time traffic conditions traffic signals consequentially set their …
For example, based on real-time traffic conditions traffic signals consequentially set their …
A review on the security of the internet of things: Challenges and solutions
… understanding the effect of security and privacy on adopting the Internet of Things. Moreover,
… The problem is that most organizations, like the hospital, lack real-time security solutions to …
… The problem is that most organizations, like the hospital, lack real-time security solutions to …
A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… For instance, the security capabilities of the devices that are retrieved dynamically and in
real time. Another factor in this dimension is the device intelligence level [13]. For example, IoT …
real time. Another factor in this dimension is the device intelligence level [13]. For example, IoT …
Deep reinforcement learning for resource protection and real-time detection in IoT environment
… requirements of intelligent manufacturing in terms of security and real-time performance [4],
[… security of verification. Though, this scheme causes high complexity, high cost, and security …
[… security of verification. Though, this scheme causes high complexity, high cost, and security …
A survey on internet of things security from data perspectives
… Most IoT devices operate automatically based on the context of real-time streaming data.
IoT scenarios call for lightweight, continuous, dynamic, context-based access control schemes. …
IoT scenarios call for lightweight, continuous, dynamic, context-based access control schemes. …
Detecting Internet of Things attacks using distributed deep learning
… of Internet of Things (IoT) connected devices is heavily dependent on the security model … to
an Nvidia Jetson TX2 for assessing the real-time inference performance in an IoT device. This …
an Nvidia Jetson TX2 for assessing the real-time inference performance in an IoT device. This …
Cyber security framework for Internet of Things-based Energy Internet
… security needs of energy domains in the 21st century. In this paper, we propose a cyber
security framework capable of providing adequate security … with the LSA in real-time to improve …
security framework capable of providing adequate security … with the LSA in real-time to improve …
Utilizing blockchain to overcome cyber security concerns in the internet of things: A review
B Alotaibi - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
… the firmware in the IoT devices in real time to keep it up and … updated in real time, which
might help IoT-blockchain secure … to use blockchain to secure Internet of Things and the stalker …
might help IoT-blockchain secure … to use blockchain to secure Internet of Things and the stalker …
RTVD: A real-time volumetric detection scheme for DDoS in the Internet of Things
… In September 2016, the website of computer security consultant Brian Krebs was hit with
620 … , the security situation is even more severe especially in the era of Internet-of-Things (IoT) …
620 … , the security situation is even more severe especially in the era of Internet-of-Things (IoT) …