RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning
… security features. The remainder of the paper is organized as follows: Section II lists the most
recent developments in the area … The steady-state analysis method is relatively unexplored, …
recent developments in the area … The steady-state analysis method is relatively unexplored, …
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions
… of Things – where traditional computer and network security are … to Schneier a high degree
of security is in our hands. He … Table 4 shows the unexplored areas of SP primitives from …
of security is in our hands. He … Table 4 shows the unexplored areas of SP primitives from …
Cyber security threats and challenges in collaborative mixed-reality
… This has focused on the Internet of Things (IoT), online games … areas relevant to CMR
applications. Then we present the … the (as yet) largely unexplored socio-technical aspects of harms …
applications. Then we present the … the (as yet) largely unexplored socio-technical aspects of harms …
[PDF][PDF] Unpacking security policy compliance: The motivators and barriers of employees' security behaviors
… occurrence and a very serious thing so security was.. it was like … quantitative studies has
remained relatively unexplored. … contributions to the security research area and organizational …
remained relatively unexplored. … contributions to the security research area and organizational …
Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things
… things in common with the aforementioned research areas, yet it goes beyond all those areas
… Mechanisms for establishing trust are thus crucial to maintain information security and data …
… Mechanisms for establishing trust are thus crucial to maintain information security and data …
Access control in Internet-of-Things: A survey
… A recent technological evolution in the area of pervasive computing is the Internet of Things
(… several security and privacy issues. In this work, we focus on one of the main security issues …
(… several security and privacy issues. In this work, we focus on one of the main security issues …
Cybersecurity issues in wireless sensor networks: current challenges and solutions
… them based the addressed security issue. Also, we outline the main security constraints and
… The WSNs are most often deployed randomly in hostile and unexplored areas, and must self…
… The WSNs are most often deployed randomly in hostile and unexplored areas, and must self…
Green internet of things for smart world
… is consisted of various ‘‘things’’. As one of the enablers of smart world, internet of things (IoT)
[2]–[7… , Internet of Things, network security and privacy, smart city, and e-health applications. …
[2]–[7… , Internet of Things, network security and privacy, smart city, and e-health applications. …
Navigating the Uncharted Waters: Exploring Challenges and Opportunities in Block chain-Enabled Cloud Computing for Future Research
… a major area of innovation. This section delves into the intricate realm of security implications,
… Upon the completion of our investigation into the unexplored domain where block chain …
… Upon the completion of our investigation into the unexplored domain where block chain …
Context aware computing for the internet of things: A survey
… on existing popular Internet of Things middleware solutions in 2011… We believe this approach
allows us to highlight the areas … (SN) and the IoT is largely unexplored and blurred. We can …
allows us to highlight the areas … (SN) and the IoT is largely unexplored and blurred. We can …