The internet of things security: A survey encompassing unexplored areas and new insights
… of electoral votes in the IoTs Era: This study discusses current trends in politics and the
security of electoral votes in the Internet of Things era. This investigation serves as a culmination …
security of electoral votes in the Internet of Things era. This investigation serves as a culmination …
Security for internet of things: A state of the art on existing protocols and open research issues
C Mahmoud, S Aouag - Proceedings of the 9th international conference …, 2019 - dl.acm.org
… unexplored area in the IoT security space. A Blockchain is a chain of blocks that store
transactions. A transaction creates a record according to type of the data stored : bitcoin, physical …
transactions. A transaction creates a record according to type of the data stored : bitcoin, physical …
A review on the security of the internet of things: Challenges and solutions
… to the current IoT security challenges for improvement, especially in the areas related to …
that are yet unexplored in the IoT and cloud environments. These aspects of unexplored IoT and …
that are yet unexplored in the IoT and cloud environments. These aspects of unexplored IoT and …
Study of security issues in pervasive environment of next generation internet of things
… Therefore need arises for a review of security threats for a new area having huge demand. …
security implementation for this type of pervasive applications is an unexplored area till date…
security implementation for this type of pervasive applications is an unexplored area till date…
Security in the internet of things-a systematic mapping study
… security of their fridge or thermostat. The main aim of this research is to determine the status
of the security … [35] list multiple research areas that are still relatively unexplored. They …
of the security … [35] list multiple research areas that are still relatively unexplored. They …
Internet of Things (IoT) cybersecurity research: A review of current research topics
Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
… things, especially heterogeneous devices. By 2015, IoT connected 4.9 billion things and will
connect 25 billion things … number also may predict a security disaster. The more devices a …
connect 25 billion things … number also may predict a security disaster. The more devices a …
Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures
… Security of the IoT comprises a number of areas, eg, attacks and their counter-measures, …
to be relatively unexplored yet imported to be investigated from the security point of view: In-…
to be relatively unexplored yet imported to be investigated from the security point of view: In-…
Twenty security considerations for cloud-supported Internet of Things
J Singh, T Pasquier, J Bacon, H Ko… - IEEE Internet of things …, 2015 - ieeexplore.ieee.org
… (mostly overlooked) area by considering security with respect to the interplay of “things”
and … The focus of this paper differs as it specifically explores security at the level where “things” …
and … The focus of this paper differs as it specifically explores security at the level where “things” …
Privacy of things: Emerging challenges and opportunities in wireless internet of things
… investigating the unexplored parts of this promising domain. … We believe that there is no
single area that can solve this … network and information security, the Internet of Things, and …
single area that can solve this … network and information security, the Internet of Things, and …
Machine learning and the Internet of Things security: Solutions and open challenges
… all life fields, security is still a limiting factor in many such application areas. A great deal of …
, as well as in hitherto unexplored domains. Certain application areas for IoT technologies are …
, as well as in hitherto unexplored domains. Certain application areas for IoT technologies are …
相关搜索
- internet of things security
- intelligent things secure communication scheme
- things iot solutions for security
- different security threats internet of things
- things security requirements challenges and solutions
- things security survey and taxonomy
- things security open challenges
- things security comprehensive review
- things security machine learning