A review on the study on MQTT security challenge
F Chen, Y Huo, J Zhu, D Fan - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
With the enhancement of mobile network access capabilities, the application of the Internet
of Things has become increasingly widespread, and related research on the Internet of …
of Things has become increasingly widespread, and related research on the Internet of …
Modelling and evaluation of malicious attacks against the iot mqtt protocol
The Internet of Things (IoT) paradigm is changing the way people live and work in society.
Advancements in various information and communication technologies have paved the way …
Advancements in various information and communication technologies have paved the way …
Secure communications and protected data for a Internet of Things smart toy platform
D Rivera, A García, ML Martín-Ruiz… - IEEE internet of …, 2019 - ieeexplore.ieee.org
The growth of the Internet of Things (IoT) has favored the emergence of new applications
and services. Consequently, new challenges in data security and protection have arisen …
and services. Consequently, new challenges in data security and protection have arisen …
[图书][B] Administração Pública Digital: proposições para o aperfeiçoamento do regime jurídico administrativo na sociedade da informação
JLMF Júnior - 2020 - books.google.com
" Recebi de José Luiz de Moura Faleiros Júnior, a quem orientei durante o curso de
Mestrado em Direito na Universidade Federal de Uberlândia, a incumbência de apresentar …
Mestrado em Direito na Universidade Federal de Uberlândia, a incumbência de apresentar …
[图书][B] IT-Sicherheit Für TCP/IP-und IoT-Netzwerke
S Wendzel - 2018 - Springer
Die Betrachtung der IT-Sicherheit von Netzwerken ist an sich kein grundlegend neues
Thema. Im Gegenteil, es ist bereits seit Jahrzehnten ein ausgereiftes Forschungs-und …
Thema. Im Gegenteil, es ist bereits seit Jahrzehnten ein ausgereiftes Forschungs-und …
A survey of IoT security: Risks, requirements, trends, and key technologies
JH Kim - Journal of Industrial Integration and Management, 2017 - World Scientific
Due to the increasing ubiquity of the internet, the “internet of things”(IoT) has become an
essential technology, penetrating people's daily lives and influencing the industry. However …
essential technology, penetrating people's daily lives and influencing the industry. However …
Information Security and Privacy in Smart Cities, Smart Agriculture, Industry 4.0, Smart Medicine, and Smart Healthcare
Abstract Internet of Things (IoT) is used to interconnect various things, devices, technologies
in a network in order to perform various tasks at a higher speed, less loss of information as …
in a network in order to perform various tasks at a higher speed, less loss of information as …
IoT security: To secure IoT devices with two-factor authentication by using a secure protocol
KB Jalbani, AH Jalbani, SS Soomro - Industrial Internet of Things …, 2020 - igi-global.com
The usage of the internet of things (IoT) devices is growing for the ease of life. From smart
homes to smart cars, from smart transportation to smart cities, from smart hospitals to smart …
homes to smart cars, from smart transportation to smart cities, from smart hospitals to smart …
[PDF][PDF] IOT Communication Technologies and Future of Internet of Things
Y Valaboju - International Journal of Scientific Research in …, 2017 - academia.edu
The idea behind Internet of things is the interconnection of internet enabled things or
devices to each other and to humans, to achieve some common goals. In near future IoT is …
devices to each other and to humans, to achieve some common goals. In near future IoT is …
On the design of a privacy-centered data lifecycle for smart living spaces
J Bugeja, A Jacobsson - Privacy and Identity Management. Data for Better …, 2020 - Springer
Many living spaces, such as homes, are becoming smarter and connected by using Internet
of Things (IoT) technologies. Such systems should ideally be privacy-centered by design …
of Things (IoT) technologies. Such systems should ideally be privacy-centered by design …