过去一年中添加的文章,按日期排序
Design of intelligent elderly care robot system based on ROS
Y Fan, Y Chen, CT Chen, J Zhao - … Conference on Electronic …, 2024 - spiedigitallibrary.org
7 天前 - In order to cope with the increasing challenge of population aging worldwide,
intelligent elderly care robots have become a solution that has attracted much attention. This …
intelligent elderly care robots have become a solution that has attracted much attention. This …
Mobile robot localization: Current challenges and future prospective
7 天前 - … Integrating MRs with the Intelligent Internet of Things (IIoT) not only makes robots
innovative, trackable, and powerful but also generates numerous threats and challenges in …
innovative, trackable, and powerful but also generates numerous threats and challenges in …
Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review
S Najafli, A Toroghi Haghighat, B Karasfi - Knowledge and Information …, 2024 - Springer
7 天前 - … and it inherits many cloud security challenges [44, 45] and solutions, however, due
to the restriction on fog devices, some cloud-based security solutions are not appropriate for …
to the restriction on fog devices, some cloud-based security solutions are not appropriate for …
[HTML][HTML] Cyber Resilience Act 2022: A silver bullet for cybersecurity of IoT devices or a shot in the dark?
MR Shaffique - Computer Law & Security Review, 2024 - Elsevier
7 天前 - … security challenges from the prism of prospective cyberattacks on these layers. Some
studies provide a general description of the challenges … importance of these challenges. …
studies provide a general description of the challenges … importance of these challenges. …
Trust management in the internet of vehicles: a systematic literature review of blockchain integration
S Abbasi, N Khaledian, AM Rahmani - … Journal of Information Security, 2024 - Springer
7 天前 - … security. Another research investigated the blockchain’s potential to manage security
challenges … is regarded pragmatically, with security considerations and trust management …
challenges … is regarded pragmatically, with security considerations and trust management …
[HTML][HTML] A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things
H Gu, J Shang, P Wang, J Mi, A Bhattacharjya - Symmetry, 2024 - mdpi.com
7 天前 - … to address the challenge of achieving consensus on the challenge value in symmetric
… We successfully meet the authentication requirements by incorporating challenge values …
… We successfully meet the authentication requirements by incorporating challenge values …
[HTML][HTML] Mitigating Adversarial Attacks against IoT Profiling
7 天前 - … The security challenges brought by IoT applications include the identification and
authentication of several devices. The problem lies in the lack of robust approaches to identify …
authentication of several devices. The problem lies in the lack of robust approaches to identify …
[PDF][PDF] Investigating Home Automation Systems: A Thorough Overview
T Malla, T Jena, T Mishra, T Suprabhasinee - fuzzy-tversu.com
7 天前 - … However, addressing challenges such as privacy, interoperability, security, and user
acceptance … the challenges and considerations related to privacy, interoperability, security …
acceptance … the challenges and considerations related to privacy, interoperability, security …
Efficiency of using the resource potential of the enterprise under the conditions of digitalization
M Shashyna, O Kocherga - Economic Synergy, 2024 - ideas.repec.org
7 天前 - … , emphasizing the importance of developing human capital and ensuring cyber
security. Challenges faced by enterprises during digitalization and possible ways to overcome …
security. Challenges faced by enterprises during digitalization and possible ways to overcome …
A Secure Network with Minimization of Energy for E-healthcare Application in IoMT
R Aluvalu, Y Balagoni - Recent Patents on Engineering, 2024 - ingentaconnect.com
8 天前 - … between various connecting nodes thanks to the combination of other technologies,
security and energy consumption provide the greatest challenge to the IoMT infrastructure. …
security and energy consumption provide the greatest challenge to the IoMT infrastructure. …