The internet of things security: A survey encompassing unexplored areas and new insights
… of electoral votes in the IoTs Era: This study discusses current trends in politics and the
security of electoral votes in the Internet of Things era. This investigation serves as a culmination …
security of electoral votes in the Internet of Things era. This investigation serves as a culmination …
A review on the security of the internet of things: Challenges and solutions
… to the current IoT security challenges for improvement, especially in the areas related to …
that are yet unexplored in the IoT and cloud environments. These aspects of unexplored IoT and …
that are yet unexplored in the IoT and cloud environments. These aspects of unexplored IoT and …
Security for internet of things: A state of the art on existing protocols and open research issues
C Mahmoud, S Aouag - Proceedings of the 9th international conference …, 2019 - dl.acm.org
… unexplored area in the IoT security space. A Blockchain is a chain of blocks that store
transactions. A transaction creates a record according to type of the data stored : bitcoin, physical …
transactions. A transaction creates a record according to type of the data stored : bitcoin, physical …
Internet of Things (IoT) cybersecurity research: A review of current research topics
Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
… things, especially heterogeneous devices. By 2015, IoT connected 4.9 billion things and will
connect 25 billion things … number also may predict a security disaster. The more devices a …
connect 25 billion things … number also may predict a security disaster. The more devices a …
Security in the internet of things-a systematic mapping study
… security of their fridge or thermostat. The main aim of this research is to determine the status
of the security … [35] list multiple research areas that are still relatively unexplored. They …
of the security … [35] list multiple research areas that are still relatively unexplored. They …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
… Security of the IoT comprises a number of areas, eg, attacks and their counter-measures, …
to be relatively unexplored yet imported to be investigated from the security point of view: In-…
to be relatively unexplored yet imported to be investigated from the security point of view: In-…
Privacy of things: Emerging challenges and opportunities in wireless internet of things
… investigating the unexplored parts of this promising domain. … We believe that there is no
single area that can solve this … network and information security, the Internet of Things, and …
single area that can solve this … network and information security, the Internet of Things, and …
Security and privacy in the age of the smart internet of things: An overview from a networking perspective
… In the short history of security and privacy study, the protected subjects are mainly … more
weight in the area of security. In this new field, we face many unexplored areas and countless …
weight in the area of security. In this new field, we face many unexplored areas and countless …
New frontiers in IoT: Networking, systems, reliability, and security challenges
… such as frame selection—area cropping (and transmitting only the cropped area), resolution
of the image, and compression that are relatively unexplored in the existing video streaming …
of the image, and compression that are relatively unexplored in the existing video streaming …
Machine learning and the Internet of Things security: Solutions and open challenges
… all life fields, security is still a limiting factor in many such application areas. A great deal of …
, as well as in hitherto unexplored domains. Certain application areas for IoT technologies are …
, as well as in hitherto unexplored domains. Certain application areas for IoT technologies are …