过去一年中添加的文章,按日期排序
Security and privacy in IoT-based Smart Farming: a review
3 天前 - … assessment, and classification. The primary objective of this study is to consolidate
all … ) applications domains, privacy/security, communication/Network protocols, and sensors/…
all … ) applications domains, privacy/security, communication/Network protocols, and sensors/…
[PDF][PDF] IOT SECURITY: BUILDING A SCALABLE NETWORK OF HIGH-INTERACTION THREAT INTELLIGENCE SENSORS
MS Ravisankar, MK Ramasamy, MP Pandiyarajan - academia.edu
19 天前 - … with IoT-based brilliant conditions security issues. As another commitment, a scientific
classification of difficulties for IoT-based shrewd climate security concerns drawn from the …
classification of difficulties for IoT-based shrewd climate security concerns drawn from the …
Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories
W Li, S Manickam, P Nanda, AK Al-Ani… - IEEE …, 2024 - ieeexplore.ieee.org
20 天前 - … This research fills this void by offering a contemporary analysis of MQTT ecosystem
security … This study presents a comprehensive taxonomy of security attacks within the MQTT …
security … This study presents a comprehensive taxonomy of security attacks within the MQTT …
[PDF][PDF] Adaptive Hybrid Case-Based Neuro-Fuzzy Model for Intrusion Detection and Prevention for Smart Home Network
26 天前 - … They assessed the correctness of their model using linear-based ML classification
… -based ML classification. This demonstrates the effectiveness of using ARP analysis as a …
… -based ML classification. This demonstrates the effectiveness of using ARP analysis as a …
[HTML][HTML] A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research …
NN Josbert, M Wei, W Ping, A Rafiq - Journal of King Saud University …, 2024 - Elsevier
28 天前 - … Table (DHT), AdaptFlow protocol, and edge/cloud storages. This paper selects
the five most used SDN controllers by the literature review and identifies the features of each …
the five most used SDN controllers by the literature review and identifies the features of each …
AI-Enabled Hardware Security Approach for Aging Classification and Manufacturer Identification of SRAM PUFs
H Singh - 2024 - rave.ohiolink.edu
30 天前 - … , we delve into examining machine learning for manufacturer classification. The …
In this study, we employ the SoftMax technique since our classification issue is multi-class. …
In this study, we employ the SoftMax technique since our classification issue is multi-class. …
Enhanced security for IoT networks: a hybrid optimized learning model for intrusion classification
S Rajarajan, MG Kavitha - Sādhanā, 2024 - Springer
42 天前 - … A detailed literature review of recent research works on IDS is analyzed in this
section. The IDS presented in [13] incorporates federated learning to detect several types of …
section. The IDS presented in [13] incorporates federated learning to detect several types of …
Internet-of-Things-Enabled Smart Agriculture: Security Enhancement Approaches
45 天前 - … In our paper, we present some security problems. Additionally, we present a simple
taxonomy of the state-of-theart authentication protocols that demonstrate their robustness …
taxonomy of the state-of-theart authentication protocols that demonstrate their robustness …
Securing the Internet of Things: A Comprehensive Review of Security Challenges and Artificial Intelligence Solutions
45 天前 - … Classification enhances IoT security by providing it with … summary of classification
techniques used for IoT security has been presented in Table 2. In IoT security, a classification …
techniques used for IoT security has been presented in Table 2. In IoT security, a classification …
Privacy-Preserving Zero-Sum-Path Evaluation of Decision Tress in Postquantum Industrial IoT
A Kjamilji - IEEE Transactions on Industrial Informatics, 2024 - ieeexplore.ieee.org
58 天前 - … Furthermore, the proposed protocols are shown to be resistant to … protocol suitable
for the postquantum world of the industrial Internet of Things, which demands strict security …
for the postquantum world of the industrial Internet of Things, which demands strict security …