On Leveraging Next-Generation Deep Learning Techniques for IoT Malware Classification, Family Attribution and Lineage Analysis

M Dib - 2021 - spectrum.library.concordia.ca
Recent years have witnessed the emergence of new and more sophisticated malware
targeting insecure Internet of Things (IoT) devices, as part of orchestrated large-scale …

Ασφάλεια και προστασία ιδιωτικότητας οικιακών συσκευών που λειτουργούν σε περιβάλλον ΔτΠ

Σ Μάρας - 2021 - polynoe.lib.uniwa.gr
Το Διαδίκτυο των Πραγμάτων (ΔτΠ) είναι πλέον μια τεχνολογία που προχωράει σταθερά
προς την καθολική της αποδοχή και όροι όπως το έξυπνο σπίτι δεν αποτελούν πλέον σενάριο …

[PDF][PDF] LIGHTWEIGHT MUTUAL AUTHENTICATION SCHEME BASED ON ELLIPTIC CURVE DEFFIE-HELLMAN KEY EXCHANGE IN MACHINE-TO-MACHINE …

S ULLAH - 2021 - eprints.utm.my
Machine-to-Machine communication today is increasing with the help of powerful computing
capabilities remotely operated through the advancement in automation devices and the …

[PDF][PDF] Health Policy and Technology

R Lederman, O Ben-Assuli, TH Vo - researchgate.net
Purpose: This narrative review surveys the literature on the Internet of Things (IoT) in
healthcare, organising it according to dominant trends to provide instructive examples of …

[图书][B] Programming Language Techniques for Improving ISA and HDL Design

MA Christensen - 2021 - search.proquest.com
Despite all the effort spent in testing, analyzing, and formally verifying software, a program is
ultimately only as correct as the underlying hardware on which it runs. As processors …

[引用][C] A SURVEY ON SECURITY CHALLENGES IN INDUSTRIAL IOT 4.0

CM Babu, G Prabaharan - Turkish Journal of Physiotherapy and Rehabilitation