A RIS empowered THz-UWO relay system for air-to-underwater mixed network: Performance analysis with pointing errors
MA Rakib, M Ibrahim, ASM Badrudduza… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
In the realm of the Internet of Things, reconfigurable intelligent surfaces (RISs) have
emerged as a pivotal technology, offering unprecedented opportunities to enhance signal …
emerged as a pivotal technology, offering unprecedented opportunities to enhance signal …
The baseline of global consumer cyber security standards for IoT: quality evaluation
K Olga Greuter, DK Sarmah - Journal of Cyber Security Technology, 2022 - Taylor & Francis
The popularity of the Internet of Things (IoT) devices has been gaining interest amongst
consumers. The rise of consumers benefiting from IoT devices has increased the threat of …
consumers. The rise of consumers benefiting from IoT devices has increased the threat of …
[PDF][PDF] Secure smart home automation and monitoring system using internet of things
MK Al-Gburi, LA Abdul-Rahaim - Indones. J. Electr. Eng. Comput. Sci, 2022 - academia.edu
As a result of the rapid increase in the number of users in internet of things (IoT)
technologies, IoT becomes one of the most important technologies that play an important …
technologies, IoT becomes one of the most important technologies that play an important …
Optimized Data Fusion with Scheduled Rest Periods for Enhanced Smart Agriculture via Blockchain Integration
The study introduces an efficient data aggregation technique for smart agriculture by
leveraging Blockchain technology and a novel method referred to as the “cluster head sleep …
leveraging Blockchain technology and a novel method referred to as the “cluster head sleep …
Security Analysis of a Lightweight Identity‐Based Two‐Party Authenticated Key Agreement Protocol for IIoT Environments
Y Li, Q Cheng, W Shi - Security and Communication Networks, 2021 - Wiley Online Library
Internet of Things brings convenience to the social life, at the same time, putting forward
higher requirements for the security of data transmission and storage. Security incidents …
higher requirements for the security of data transmission and storage. Security incidents …
Exploring the Relationships Between Digital Life Balance and Internet Social Capital, Loneliness, Fear of Missing Out, and Anxiety
M Duradoni, E Serritella, FP Severino… - Human Behavior and …, 2024 - Wiley Online Library
In today's interconnected world, the widespread use of the Internet necessitates an
understanding of factors influencing individuals' ability to maintain a balanced relationship …
understanding of factors influencing individuals' ability to maintain a balanced relationship …
Enhanced elliptic curve-diffie hellman technique with bigdata analytics for satellite image security enhancement in internet of things systems
With the emergence of cloud eco-system and technologies like Internet of Things (IoT), bit
data analytics became essential to reap benefits of maintaining large volumes of data. As …
data analytics became essential to reap benefits of maintaining large volumes of data. As …
Usability and security testing of online links: a framework for click-through rate prediction using deep learning
R Damaševičius, L Zailskaitė-Jakštė - Electronics, 2022 - mdpi.com
The user, usage, and usability (3U's) are three principal constituents for cyber security. The
effective analysis of the 3U data using artificial intelligence (AI) techniques allows to deduce …
effective analysis of the 3U data using artificial intelligence (AI) techniques allows to deduce …
AIS-NIDS: An intelligent and self-sustaining network intrusion detection system
The ever-evolving landscape of network security is continually molded by the dynamic
evolution of attack vectors and the relentless emergence of new, highly sophisticated …
evolution of attack vectors and the relentless emergence of new, highly sophisticated …