过去一年中添加的文章,按日期排序

A Systematic Review of Blockchain-based Privacy-Preserving Reputation Systems for IoT Applications

H Mahmoud, J Arshad, A Aneiba - Distributed Ledger Technologies: Research … - dl.acm.org
3 天前 - … These studies are evaluated regarding security (including integrity and privacy)
and non-security requirements to highlight open research challenges. In alignment with this, an …

A Review of IoMT Security and Privacy related Frameworks

RM Rajab, M Abuhmida… - … and Security, 2024 - papers.academic-conferences.org
5 天前 - … A crucial requirement to ensure assuring the security and privacy of the IoMT
ecosystem is acceptable, standardized frameworks with effective mechanisms, regulations, and …

Bitmap-Based Security Monitoring for Deeply Embedded Systems

A Peng, D Fang, L Guan, E Kouwe, Y Li… - ACM Transactions on …, 2024 - dl.acm.org
7 天前 - … are becoming popular with the emergence of Internet of Things (IoT) technology.
However, these … The memory requirements are constant and small, regardless of the number of …

Metaverse of Things (MoT) Applications for Revolutionizing Urban Living in Smart Cities

T Alam - 2024 - preprints.org
8 天前 - … The findings emphasise the importance of robust legislative frameworks, stringent
security requirements, and well-developed infrastructure to facilitate the extensive use of MoT …

Harnessing IoT-Powered Fire Detection Systems for Enhanced Security Check for updates

S Kanagamalliga, TSA Radha… - Advances in Distributed … - books.google.com
8 天前 - … smart fire detection systems empowered by the Internet of Things (IoT), showcasing
their … The paper also addresses hardware requirements, presenting a block diagram of the …

A comprehensive study of LPWAN, LoRaWAN for IoT: Background, related research, performance, potential challenges and proposed methodology

S Tarannum, SM Usha, GF Ahammed - AIP Conference Proceedings, 2024 - pubs.aip.org
8 天前 - … However, modest data rates, extensively wide range and low-power requirement,
makes it favorable technology for majority of the internet of things verticals. LoRa allows End …

[HTML][HTML] Enhancing honeynet-based protection with network slicing for massive Pre-6G IoT Smart Cities deployments

AM Escolar, Q Wang, JMA Calero - Journal of Network and Computer …, 2024 - Elsevier
9 天前 - … This paper provides a novel solution to empower honeynet security tools with Network
… The proposed system supports the ambitious IoT scalability requirements associated to …

ECMHP: ECC-based Secure Handshake Protocol for Multicasting in CCN-IoT Environment

K Saha, S Ray, M Dasgupta - authorea.com
9 天前 - … by the Internet of Things in the modern era of the Internet. Content Centric Networks
(CCN) and Named Data Networks (NDN) are some proposed solutions that can meet the …

[图书][B] Internet of Things Vulnerabilities and Recovery Strategies

F Masoodi, A Bamhdi, MA Charoo, Z Masoodi, A Lattoo… - 2024 - books.google.com
9 天前 - … IoT envelopes technology that creates a network of Internet- enabled physical things
or objects that we use in our everyday lives. Such physical things or objects are embedded …

Hybrid intelligent logistics system for a recycling center

M Sihvonen - Advances in Human Factors of …, 2024 - openaccess.cms-conferences.org
9 天前 - A realization of intelligent logistic system for a recycling center requires utilization
of very latest information and communication technologies. Therefore, versatile technology …