过去一年中添加的文章,按日期排序

Blockchain-based Smart Monitoring Framework for Defense Industry

A Alqahtani, S Alsubai, A Alanazi, M Bhatia - IEEE Access, 2024 - ieeexplore.ieee.org
11 天前 - … Recent advancements in Internet of Things (IoT) technology … utilized IoT technology
for national security purposes [3]… By integrating IoT in various defense systems, monitoring …

Research of Mobile Edge Computing for Future Mobile Communications: A Review.

Y Shouyi, C Yihang, Z Shuangling… - Journal of …, 2024 - search.ebscohost.com
11 天前 - … 来渲染三维图像;在智能医疗中, 物联网 ( Internet of Things,IoT) 设备收集到的生理数据
也 … A MECbased architecture to secure IoT applications using federated deep learning[J]. …

Internet of Things (IoT) Security

DJ Edwards - Mastering Cybersecurity: Strategies, Technologies, and …, 2024 - Springer
12 天前 - … at a premium, such as in home automation, industrial automation, and sensor
networks. … Network segmentation and isolation are essential to network security practices in IoT. …

[PDF][PDF] Novel and Secure Blockchain Framework for Internet of Things Health Applications

ATRK Priya, R Anuja - ijatem.com
12 天前 - … during transmission in an IoT environment, which cause … an IoT setting to solve
security concerns and eliminate third parties involvement. In this paper, secure blockchain for IoT

[PDF][PDF] A Distributed Intrusion Detection System for IoT-Enabled Network and Devices using Hybrid Technique

IN Davies, OE Taylor, VIE Anireh, EO Bennett - iiardjournals.org
12 天前 - … ecosystem, this study contributes to ensuring the secure and reliable operation
of … Nevertheless, this study makes a significant contribution to the field of IoT security by …

COMPARATIVE ANALYSIS OF RANDOM FOREST AND ADABOOST LEARNING MODELS FOR THE CLASSIFICATION OF ATTACKS IN INTERNET OF THINGS

UA Adeniyi, MO Alimi, AM Oyelakin… - FUDMA JOURNAL …, 2024 - fjs.fudutsinma.edu.ng
12 天前 - … There is no doubt that there is room for more advanced techniques to improve
network security as network attacks rise in number and the amount of information present in …

Bayesian decision model based reliable route formation in internet of things

MJ Kumar, S Mishra, GR Elangovan… - Indonesian Journal …, 2024 - garuda.kemdikbud.go.id
13 天前 - Security provisioning has become an important issue in wireless multimedia
networks because of their crucial task of supporting several services. This paper presents …

Internet of Things (IoT) and its Utilisation in Marine Logistics

AH Djalante - Collaborate Engineering Daily Book Series, 2024 - findcollaborate.com
13 天前 - … implementation also faces challenges related to data security, interoperability,
investment costs, and regulation. This research provides in-depth insights into how …

Pascal Muam Mah¹ (), Iwona Skalna¹, Tomasz Pełech-Pilichowski¹, Gilly Njoh Amuzang2, Micheal Blake Somaah Itoe², and Ning Frida Tah² 1 AGH University of …

GN Amuzang, MBS Itoe, NF Tah - … , IBIMA-AI 2023, Granada, Spain, June … - books.google.com
13 天前 - … of the Internet of things and wireless sensor networks on data security for
community mindset. We concluded that the Integration of IoTs with WSNs can secure a perfect …

An Energy-Efficient improved Grey Wolf Optimization Algorithm-Based Cluster Head and Shamir Secrets Sharing-Based WSNs with Secure Data Transfer

M Yuvaraja, S Sureshkumar… - Salud, Ciencia y …, 2024 - conferencias.saludcyt.ar
13 天前 - … , WSNs (Wireless Sensor Networks) have intrigued plenty … this study, secure CHs
and data transmission paths in IoT-… The CH choices are utilised to boost the IoT-based WSNs’…