[PDF][PDF] Problematika hukum bank Indonesia dalam pengawasan uang elektronik di Indonesia
A Pratama - 2020 - digilib.uns.ac.id
library.uns.ac.id digilib.uns.ac.id 54 DAFTAR PUSTAKA Buku Abdulkadir Muhammad. 2010.
Hukum Perusahaan Indonesia. Cetakan Keempa Page 1 library.uns.ac.id digilib.uns.ac.id 54 …
Hukum Perusahaan Indonesia. Cetakan Keempa Page 1 library.uns.ac.id digilib.uns.ac.id 54 …
An Investigation into the Privacy and Security Risks of Smart Toys in New Zealand
N Girvan - 2020 - openrepository.aut.ac.nz
Smart toys are a growing portion of the children's toy market. They offer a unique and
personalised play experience via the use of onboard sensors, internet connectivity, and …
personalised play experience via the use of onboard sensors, internet connectivity, and …
[PDF][PDF] Software Defined Networking Based Protection against DDOS in IoT
PJB Pajila, P Jenifer, C Karpagavalli, AAV Sweety… - researchgate.net
Safety has become enormously important with the proliferation of internet of Things (IoT)
technologies. Most of the IoT devices are linked with the DDoS attack, there are many risk …
technologies. Most of the IoT devices are linked with the DDoS attack, there are many risk …
Controlled Charging of Electrical Vehicles on Residential Power Grid
J Hindér, S Wijk - 2018 - odr.chalmers.se
The market for electric vehicles (EVs) is growing explosively and shows no signs of
stopping. With more and more owners of EVs, a significant load increase on the power grid …
stopping. With more and more owners of EVs, a significant load increase on the power grid …
[PDF][PDF] Nesnelerin interneti döneminde reklamcılığın geleceği: reklam uygulayıcıların ve reklam akademisyenleri üzerine karşılaştırılmalı bir araştırma
SŞ Durdu - 2019 - dspace.yasar.edu.tr
YAŞAR ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ İLETİŞİM ANABİLİM DALI YÜKSEK
LİSANS TEZİ NESNELERİN İNTERNET Page 1 2019 İZMİR YAŞAR ÜNİVERSİTESİ …
LİSANS TEZİ NESNELERİN İNTERNET Page 1 2019 İZMİR YAŞAR ÜNİVERSİTESİ …
[PDF][PDF] Using open channels to trigger IoT's invited, unintended consequences
We describe bridging IoT's air gap using device speakers to communicate with voice
assistants. We recommend protecting voice channels using twofactor authentication …
assistants. We recommend protecting voice channels using twofactor authentication …
Run-time security assurance of cyber physical system applications
MT Khan, D Serpanos, H Shrobe - … , and IoT Systems: Essays Dedicated to …, 2020 - Springer
We introduce a design methodology to assure run-time security of cyber physical system
(CPS) applications. The methodology has two independent, but complementary …
(CPS) applications. The methodology has two independent, but complementary …
Finding and Exploiting Vulnerabilities in Embedded TCP/IP Stacks
W Wang - 2021 - essay.utwente.nl
In the context of the rapid development of IoT technology, cyber-attacks are becoming more
frequent, and the damage caused by cyber-attacks is remaining obstinately high. How to …
frequent, and the damage caused by cyber-attacks is remaining obstinately high. How to …
Model Checking Denial-of-Service Attack against IEEE 802.15. 6 Protocol
H Liu, Y Wang, K Zheng… - 2018 9th International …, 2018 - ieeexplore.ieee.org
With the prevalence of Internet of Things, numerous system vulnerabilities can be explored,
and the hacker may launch a series of DoS attacks by exploiting the vulnerabilities of the …
and the hacker may launch a series of DoS attacks by exploiting the vulnerabilities of the …
Relay cooperative secret key generation for quasi-static channels in internet of things
S XIAO, Y GUO, H BAI, L JIN, K HUANG - 电子与信息学报, 2018 - jeit.ac.cn
A secret key generation scheme based on a cooperative relay is proposed to improve the
generated secret key rate for quasi-static channels in Internet of things. Firstly, the two …
generated secret key rate for quasi-static channels in Internet of things. Firstly, the two …