[PDF][PDF] Problematika hukum bank Indonesia dalam pengawasan uang elektronik di Indonesia

A Pratama - 2020 - digilib.uns.ac.id
library.uns.ac.id digilib.uns.ac.id 54 DAFTAR PUSTAKA Buku Abdulkadir Muhammad. 2010.
Hukum Perusahaan Indonesia. Cetakan Keempa Page 1 library.uns.ac.id digilib.uns.ac.id 54 …

An Investigation into the Privacy and Security Risks of Smart Toys in New Zealand

N Girvan - 2020 - openrepository.aut.ac.nz
Smart toys are a growing portion of the children's toy market. They offer a unique and
personalised play experience via the use of onboard sensors, internet connectivity, and …

[PDF][PDF] Software Defined Networking Based Protection against DDOS in IoT

PJB Pajila, P Jenifer, C Karpagavalli, AAV Sweety… - researchgate.net
Safety has become enormously important with the proliferation of internet of Things (IoT)
technologies. Most of the IoT devices are linked with the DDoS attack, there are many risk …

Controlled Charging of Electrical Vehicles on Residential Power Grid

J Hindér, S Wijk - 2018 - odr.chalmers.se
The market for electric vehicles (EVs) is growing explosively and shows no signs of
stopping. With more and more owners of EVs, a significant load increase on the power grid …

[PDF][PDF] Nesnelerin interneti döneminde reklamcılığın geleceği: reklam uygulayıcıların ve reklam akademisyenleri üzerine karşılaştırılmalı bir araştırma

SŞ Durdu - 2019 - dspace.yasar.edu.tr
YAŞAR ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ İLETİŞİM ANABİLİM DALI YÜKSEK
LİSANS TEZİ NESNELERİN İNTERNET Page 1 2019 İZMİR YAŞAR ÜNİVERSİTESİ …

[PDF][PDF] Using open channels to trigger IoT's invited, unintended consequences

J Siegel, S Sarma - Secur. Privacy, 2019 - researchgate.net
We describe bridging IoT's air gap using device speakers to communicate with voice
assistants. We recommend protecting voice channels using twofactor authentication …

Run-time security assurance of cyber physical system applications

MT Khan, D Serpanos, H Shrobe - … , and IoT Systems: Essays Dedicated to …, 2020 - Springer
We introduce a design methodology to assure run-time security of cyber physical system
(CPS) applications. The methodology has two independent, but complementary …

Finding and Exploiting Vulnerabilities in Embedded TCP/IP Stacks

W Wang - 2021 - essay.utwente.nl
In the context of the rapid development of IoT technology, cyber-attacks are becoming more
frequent, and the damage caused by cyber-attacks is remaining obstinately high. How to …

Model Checking Denial-of-Service Attack against IEEE 802.15. 6 Protocol

H Liu, Y Wang, K Zheng… - 2018 9th International …, 2018 - ieeexplore.ieee.org
With the prevalence of Internet of Things, numerous system vulnerabilities can be explored,
and the hacker may launch a series of DoS attacks by exploiting the vulnerabilities of the …

Relay cooperative secret key generation for quasi-static channels in internet of things

S XIAO, Y GUO, H BAI, L JIN, K HUANG - 电子与信息学报, 2018 - jeit.ac.cn
A secret key generation scheme based on a cooperative relay is proposed to improve the
generated secret key rate for quasi-static channels in Internet of things. Firstly, the two …