Smart home-smartphone systems: Threats, security requirements and open research challenges

K Karimi, S Krit - 2019 International Conference of Computer …, 2019 - ieeexplore.ieee.org
Nowadays, home automation becomes part of people's daily life. Many people aim to control
their homes with a click on a smartphone but they are afraid to lose their confidentiality or …

Measuring and benchmarking the productivity of excavators in infrastructure projects: A deep neural network approach

M Kassem, E Mahamedi, K Rogage, K Duffy… - Automation in …, 2021 - Elsevier
Inefficiencies in the management of earthmoving equipment greatly contribute to the
productivity gap of infrastructure projects. This paper develops and tests a Deep Neural …

IoT applications and challenges in smart cities and services

I Rafiq, A Mahmood, S Razzaq… - The Journal of …, 2023 - Wiley Online Library
Abstract Internet of Things (IoT) is a revolutionary and novel platform where a smart network
connects to the large number of electronic devices via internet through available …

Web of things: security challenges and mechanisms

R Sardar, T Anees - Ieee Access, 2021 - ieeexplore.ieee.org
Web of things (WoT) is an improved and most promising infrastructure of the internet of
things (IoT) which permits the smart things to not only integrate to the internet but also to the …

A fast and scalable authentication scheme in IOT for smart living

J Li, J Jin, L Lyu, D Yuan, Y Yang, L Gao… - Future Generation …, 2021 - Elsevier
Numerous resource-limited smart objects (SOs) such as sensors and actuators have been
widely deployed in smart environments, opening new attack surfaces to intruders. The …

Moving beyond the technology: a socio-technical roadmap for low-cost water sensor network applications

F Mao, K Khamis, J Clark, S Krause… - Environmental …, 2020 - ACS Publications
In this paper, we critically review the current state-of-the-art for sensor network applications
and approaches that have developed in response to the recent rise of low-cost technologies …

[HTML][HTML] A survey on opinion summarization techniques for social media

ME Moussa, EH Mohamed, MH Haggag - Future Computing and …, 2018 - Elsevier
The volume of data on the social media is huge and even keeps increasing. The need for
efficient processing of this extensive information resulted in increasing research interest in …

[PDF][PDF] Mitigating the impact of IoT routing attacks on power consumption in IoT healthcare environment using convolutional neural network

SOM Kamel, S Abou Elhamayed - International Journal of …, 2020 - researchgate.net
IoT provides big contribution to healthcare for elderly care at home. There are many attacks
in IoT healthcare network which may destroy the entire network. A propose a framework may …

Edge security: Challenges and issues

X Jin, C Katsis, F Sang, J Sun, A Kundu… - arXiv preprint arXiv …, 2022 - arxiv.org
Edge computing is a paradigm that shifts data processing services to the network edge,
where data are generated. While such an architecture provides faster processing and …

[HTML][HTML] Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot

ABF Khan, G Anandharaj - Egyptian Informatics Journal, 2021 - Elsevier
The extensive growth of the Internet of Things (IoT) devices leads to the evolution of the
broad range of smart applications in numerous fields such as smart home, wearable …