过去一年中添加的文章,按日期排序

Design of intelligent elderly care robot system based on ROS

Y Fan, Y Chen, CT Chen, J Zhao - … Conference on Electronic …, 2024 - spiedigitallibrary.org
7 天前 - In order to cope with the increasing challenge of population aging worldwide,
intelligent elderly care robots have become a solution that has attracted much attention. This …

Mobile robot localization: Current challenges and future prospective

I Ullah, D Adhikari, H Khan, MS Anwar, S Ahmad… - Computer Science …, 2024 - Elsevier
7 天前 - … Integrating MRs with the Intelligent Internet of Things (IIoT) not only makes robots
innovative, trackable, and powerful but also generates numerous threats and challenges in …

Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review

S Najafli, A Toroghi Haghighat, B Karasfi - Knowledge and Information …, 2024 - Springer
7 天前 - … and it inherits many cloud security challenges [44, 45] and solutions, however, due
to the restriction on fog devices, some cloud-based security solutions are not appropriate for …

[HTML][HTML] Cyber Resilience Act 2022: A silver bullet for cybersecurity of IoT devices or a shot in the dark?

MR Shaffique - Computer Law & Security Review, 2024 - Elsevier
7 天前 - security challenges from the prism of prospective cyberattacks on these layers. Some
studies provide a general description of the challenges … importance of these challenges. …

Trust management in the internet of vehicles: a systematic literature review of blockchain integration

S Abbasi, N Khaledian, AM Rahmani - … Journal of Information Security, 2024 - Springer
7 天前 - security. Another research investigated the blockchain’s potential to manage security
challenges … is regarded pragmatically, with security considerations and trust management …

[HTML][HTML] A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things

H Gu, J Shang, P Wang, J Mi, A Bhattacharjya - Symmetry, 2024 - mdpi.com
7 天前 - … to address the challenge of achieving consensus on the challenge value in symmetric
… We successfully meet the authentication requirements by incorporating challenge values …

[HTML][HTML] Mitigating Adversarial Attacks against IoT Profiling

ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux - Electronics, 2024 - mdpi.com
7 天前 - … The security challenges brought by IoT applications include the identification and
authentication of several devices. The problem lies in the lack of robust approaches to identify …

[PDF][PDF] Investigating Home Automation Systems: A Thorough Overview

T Malla, T Jena, T Mishra, T Suprabhasinee - fuzzy-tversu.com
7 天前 - … However, addressing challenges such as privacy, interoperability, security, and user
acceptance … the challenges and considerations related to privacy, interoperability, security

Efficiency of using the resource potential of the enterprise under the conditions of digitalization

M Shashyna, O Kocherga - Economic Synergy, 2024 - ideas.repec.org
7 天前 - … , emphasizing the importance of developing human capital and ensuring cyber
security. Challenges faced by enterprises during digitalization and possible ways to overcome …

A Secure Network with Minimization of Energy for E-healthcare Application in IoMT

R Aluvalu, Y Balagoni - Recent Patents on Engineering, 2024 - ingentaconnect.com
8 天前 - … between various connecting nodes thanks to the combination of other technologies,
security and energy consumption provide the greatest challenge to the IoMT infrastructure. …