The First 20 Years of IEEE Security & Privacy

S Peisert - IEEE Security & Privacy, 2023 - ieeexplore.ieee.org
IEEE Security & Privacy published Volume 1, Issue 1 20 years ago in January/February
2003. This year, beginning with this issue of IEEE Security & Privacy, we aim to celebrate …

A Systematic Literature Review on Cyber Security Threats of Industrial Internet of Things

R Gedam, S Rahamatkar - Cyber‐Physical Systems …, 2022 - Wiley Online Library
In recent years, the Industrial Internet of Things (IIoT) has become one of the popular
technology among Internet users for transportation, business, education, and …

Exploring the Determinants of Successful IoT Adoption: The Case of German Manufacturing

A Zhuankhan, J Renken - International Journal of Innovation and …, 2023 - ideas.repec.org
In this study, we explore the factors influencing the successful IoT adoption. Based on the
technology–organization–environment (TOE) theory and literature analysis, 14 …

Middleware Solutions for the Internet of Things: A Survey

MA El Khaddar - Middleware Architecture, 2021 - books.google.com
Abstract The Internet of Things (IoT), along with its wider variants including numerous
technologies, things, and people: the Internet of Everything (IoE) and the Internet of Nano …

Fog computing and edge computing for the strengthening of structural monitoring systems in health and early warning score based on Internet of Things

LJR Lopez, GAP Aponte - Research Anthology on Edge Computing …, 2022 - igi-global.com
Currently, with the implementation of IoT, it is expected that medicine and health obtain a
great benefit derived from the development of portable devices and connected sensors …

[PDF][PDF] Robust Zero-Watermarking by Circular Features and 1-D NRDPWT Transformation

HC Tseng, KC Hung - Journal of Computers, 2024 - csroc.org.tw
This paper introduces a secure and robust zero-watermarking framework that leverages the
advantages of zero-watermarking, ensuring non-destructive modification of original images …

IRIS: A Pragmatic Approach to Build an Integrated and Robust IOT System to Counter Malware

G Bakshi, R Verma, R Chaudhry - … in Data Mining and Information Security …, 2022 - Springer
In the current scenario, the necessity of IoT security and the prevention of system
misconfiguration has become unequivocal. Recent inclinations have presented a staggering …

Systematic Mapping on Internet of Things' Client-Sided Development

R Figueira Goncalves, A Menolli… - Proceedings of the XVIII …, 2022 - dl.acm.org
Context: the Internet of Things (IoT) is a paradigm that provides an ecosystem for a fast-
growing quantity of connected devices, also defined as cyber-physical devices. Problem: the …

Povećanje bezbednosti i privatnosti integrisanjem sigurnog blokčejn interfejsa u arhitekturu interneta stvari

N Pavlović - Универзитет Сингидунум, 2022 - nardus.mpn.gov.rs
Internet stvari i blokčejn se smatraju za dve glavne tehnologije današnjice. Smanjenje
kašnjena i povezanost sistema je dovelo do veće fleksibilnosti pri korišćenju aplikacija koje …

A Practical Incremental Device Scanning Start-up Time Prediction Scheme for IoT

F Shichen, Z Kunsan, Z Guangyan - Proceedings of the 7th International …, 2022 - dl.acm.org
With the development of IoT, IoT devices are deployed to numerous critical infrastructures,
and their security has received wide attention. Using a device fingerprint to identify the …