A Novel Image Alignment Technique Leveraging Teaching Learning-Based Optimization for Medical Images

P Arora, R Mehta, R Ahuja - International Conference on Data Analytics & …, 2023 - Springer
In image registration, traditional optimization techniques are incapable of detecting the
optimum value of geometric transformation parameters. To resolve this issue, a novel …

Semiotics: An Approach to Model Security Scenarios for IoT-Based Agriculture Software.

J Ariel Hurtado, L Antonelli, S López… - Revista Tecno …, 2024 - search.ebscohost.com
English Agriculture is a vital human activity that contributes to sustainable development. A
few decades ago, the agricultural sector adopted the Internet of Things (IoT), which has …

[PDF][PDF] Matrix-Based Graph Comparison Method for Behavioural Patterns Analysis with Application to Anomaly Detection Using Machine Learning in Wireless Multi …

R ZAKRZEWSKI - 2024 - research-information.bris.ac.uk
The digital world we live in emphasises the importance of data. From an end-user
perspective, data content and availability are important as they help to meet users' demands …

Industrial Internet of Things: A Cyber Security Perspective Investigation

FS Al-Zahrani, N Hassan - 2023 1st International Conference …, 2023 - ieeexplore.ieee.org
The IIoT arose as a result of the increased automation, dependability, and management that
Industry 4.0 introduced to the manufacturing and production sectors. The Internet of Things …

Resource Integration in the Vehicle Ecosystem: A Literature Review

A Alotaibi, A Barros, K Degirmenci - Proceedings of the 29th …, 2023 - eprints.qut.edu.au
Integrating a mid-range theory and service-dominant (SD) logic as a metaperspective is
essential to quantify resource integration and determine value co-creation. This study …

INTERNET OF THINGS AND CYBER ATTACKS AMONG FINTECH COMPANIES IN KENYA

MW Karanja, P Gatobu - International Journal of Social …, 2024 - sagepublishers.com
In the advent of technological growth, information and communication growth, the internet
security has become an issue of significant importance attracting the attention of cyber …

Anomaly-Based Detection of Microarchitectural Attacks for IoT Devices

C Li, JL Gaudiot - 2023 - researchsquare.com
With the rapid growth of Internet of Things (IoT) technology, the number of connected
devices and information processed through the Internet has significantly risen. As a result …

Categorizing IoT Services According to Security Risks

O Dominik, M Miljenko, V Marin - … on Future Access Enablers of Ubiquitous …, 2021 - Springer
Internet of things has been a part of our lives, both at home and in workplace, for several
years now. However, due to its popularity, numerous security issues are emerging related to …

[PDF][PDF] Towards adaptive security for mobile IoT

A Arab, G Jaber, A Bouabdallah - Technological Systems, Sustainability …, 2024 - hal.science
The Internet of Things (IoT) is a groundbreaking concept that aims to establish seamless
connectivity among a wide array of devices. The IoT devices has revolutionized various …

Energy Harvesting in IoT-Enabled Flexible Sensors: Smart Sensing and Secure Access Control

S Pal, A Nag - Flexible Sensors for Energy-Harvesting Applications, 2022 - Springer
Energy harvesting is a significant issue in IoT systems. Due to the resource-constrained
nature of the device and system-specific requirements for designing an IoT system, it is …