Survey on Wireless Information Energy Transfer (WIET) and Related Applications in 6G Internet of NanoThings (IoNT)

P Sharma, RJ Pandya, S Iyer, A Sharma - Proceedings of the Indian …, 2023 - Springer
Abstract In the Wireless Information and Energy Transfer (WIET) technology, in addition to
information, electromagnetic waves carry energy in the energy harvesting mode, and hence …

A Study of the Man and Unmanned Teaming System for Improving Efficiency in a Fulfillment Center

A Khudoyberdiev, SSR Garnaik, HY Kim, J Ryoo - IEEE Access, 2023 - ieeexplore.ieee.org
In fulfillment centers, efficient inbound transportation and goods storage are crucial factors
that impact overall performance and supply chain costs. Traditional processes often involve …

Improving IoT Security Through Machine Learning

R Kumar - 2023 International Conference on Computing …, 2023 - ieeexplore.ieee.org
The swift proliferation of the Internet of Things (IoT) has escalated security apprehensions,
prompting extensive research into viable solutions using established techniques and …

[图书][B] Cybersecurity Attacks Detection for MQTT-IoT Networks Using Machine Learning Ensemble Techniques

SMB Abdelbasit - 2023 - search.proquest.com
Abstract The Internet of Things (IoT) is one of the technical advancements that is progressing
swiftly. which promises to be revolutionary soon. IoT systems are convenient due to its …

Investigating Security and Privacy Concerns in Deep-Learning-based Pervasive Health Monitoring Architectures

A Boulemtafes, A Amira, MS Derki… - 2023 5th International …, 2023 - ieeexplore.ieee.org
Pervasive Health Monitoring (PHM) uses sensors and wearable devices and data analytics
for real-time health monitoring. It enables early detection and personalized care …

Security, Privacy, Trust, and Other Issues in Industries 4.0

A Kumar, M Ramachandran, M Manjula… - Topics in Artificial …, 2024 - Wiley Online Library
In today's global scenario, digitalization has reached a higher level. In the earlier era, only
mobile phones and computers were connected to the internet, but with the advent of new …

Convergence of Blockchain Enabled Internet of Things (IoT) Framework: A Survey

V Upadhyay, A Vaish, J Kokila - International Symposium on Ubiquitous …, 2023 - Springer
Recent research and experiments in the field of Internet of Things (IoT) security have found
that these devices are vulnerable to various attacks, ranging from cyber-attacks to physical …

Exploring the Path Loss of a Hacking Tool for Security Matters in the Internet of Things

R Mata-Hernandez, M Cardenas-Juarez… - … Autumn Meeting on …, 2023 - ieeexplore.ieee.org
The rapid expansion of the Internet of Things (IoT), now with billions of mainly wireless
interconnected devices, has brought concerns and challenges regarding the security of IoT …

Exploratory Research of Cyber Security Dimensions: Selected Use Cases Analysis

A Vaish, V Upadhyay, S Bobek… - … Challenges for Cyber …, 2023 - igi-global.com
Cybersecurity research is gaining a lot of importance in recent times. Bibliometric analysis of
cyber security research showed major areas and their overlapping. Due to overlapping …

Local differential privacy for data security in key value pair data

V Vijayachandran - Journal of Computational Methods in …, 2024 - content.iospress.com
Data collection using local differential privacy (LDP) has mainly been studied for
homogeneous data. Several data categories, including key-value pairs, must be estimated …