Akıllı Ev Sistemleri için XGBoost Tabanlı Saldırı Tespit Yöntemi.
O Yaman, R Tekin - Journal of Intelligent Systems: Theory & …, 2023 - search.ebscohost.com
Öz Günümüz akıllı evlerinde IoT (Internet of Things) teknolojisinin alt yapısı kullanılmaktadır.
Akıllı evlerin kullanımı arttıkça bu alandaki siber saldırılar da artmaktadır. Akıllı evlere yönelik …
Akıllı evlerin kullanımı arttıkça bu alandaki siber saldırılar da artmaktadır. Akıllı evlere yönelik …
A Vision of Intelligent IoT—Trends, Characteristics and Functional Architecture
Y Li, W Chen, Y Ding, Y Qie… - … and Mobile Computing …, 2022 - ieeexplore.ieee.org
Driven by new business, data and technology, the Internet-of-Things (IoT) has gradually
evolved from a local Internet-of-Things and a wide-area Internet-of-Things to a prospective …
evolved from a local Internet-of-Things and a wide-area Internet-of-Things to a prospective …
A Consent Framework for the Internet of Things in the GDPR Era
G Chikukwa - 2021 - scholar.dsu.edu
Abstract The Internet of Things (IoT) is an environment of connected physical devices and
objects that communicate amongst themselves over the internet. The IoT is based on the …
objects that communicate amongst themselves over the internet. The IoT is based on the …
[PDF][PDF] Development of Machine Learning Based Security Model for IoT Network
M JAWARNEH - 2023 - irejournals.com
IoT allows the worldwide concept of intelligent cities. Smart homes, intelligent agriculture,
intelligent environment, intelligent health, smart governance etc are all types of smart cities …
intelligent environment, intelligent health, smart governance etc are all types of smart cities …
A survey on emerging security issues, challenges, and solutions for Internet of things (IoTs)
A Khan, D Peraković - Advances in Malware and Data-Driven …, 2022 - igi-global.com
The internet of things is a cutting-edge technology that is vulnerable to all sorts of fictitious
solutions. As a new phase of computing emerges in the digital world, it intends to produce a …
solutions. As a new phase of computing emerges in the digital world, it intends to produce a …
Three-way security framework for cloud based IoT network
The Internet of Things (IoT) is an extensive and rapidly growing technology. Due to its
networked nature and rapid implementation in various fields, security is considered a …
networked nature and rapid implementation in various fields, security is considered a …
[PDF][PDF] Authentication and the Internet of Things
EO e Silva, WTS de Lima, FS Ferraz… - ICSEA, 2017 - academia.edu
The term Internet of Things (IoT) is used to describe many objects connected and
communicating with each other. In this scenario, where different things share information in …
communicating with each other. In this scenario, where different things share information in …
[PDF][PDF] NESNELERİN İNTERNETİNDE ZIGBEE 3.0 AĞLARINA GÜVENLİ KATILIM İÇİN YENİ BİR MODEL ÖNERİSİ
E Deniz, R Samet - Uluslararası Bilgi Güvenliği Mühendisliği Dergisi, 2019 - dergipark.org.tr
Günümüzde İnternet, günlük yaşamda çok önemli bir yere sahiptir. Nesnelerin İnterneti de
özellikle modern İnternet dünyasında en çok kullanılan teknolojilerden birisi olmuştur …
özellikle modern İnternet dünyasında en çok kullanılan teknolojilerden birisi olmuştur …
A Literature Review of Challenges in Internet of Things
Internet has become the most important part of our life. It helps in doing our household, office
works, entertainment, traveling, farming, and many more. For making a connection among …
works, entertainment, traveling, farming, and many more. For making a connection among …
Increase in security of authentication services through additional identification using optimal feature space
A Iskhakov, R Meshcheryakov… - … , Social sphere and …, 2017 - atlantis-press.com
The research focuses on topical issue of the Internet security. In particular, the issue of level
increase in security of authentication services through additional identification using optimal …
increase in security of authentication services through additional identification using optimal …