Three-tier storage framework based on TBchain and IPFS for protecting IoT security and privacy
Y Li, Y Yu, X Wang - ACM Transactions on Internet Technology, 2023 - dl.acm.org
Recently, most of the Internet of things (IoT) infrastructures are highly centralized with single
points of failure, which results in serious security and privacy issues of IoT data. Fortunately …
points of failure, which results in serious security and privacy issues of IoT data. Fortunately …
Output Positioning to Derive Maximum Entropy From Physical Unclonable Functions
S Abdolinezhad, L Zimmermann… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are increasingly generating attention in the field of
hardware-based security for the Internet of Things (IoT). A PUF, as its name implies, is a …
hardware-based security for the Internet of Things (IoT). A PUF, as its name implies, is a …
Cyber-security of industrial internet of things in electric power systems
H Sarjan, A Ameli, M Ghafouri - IEEE Access, 2022 - ieeexplore.ieee.org
Electric Power Systems (EPSs) are among the most critical infrastructures of any society,
since they significantly impact other infrastructures. Recently, there has been a trend toward …
since they significantly impact other infrastructures. Recently, there has been a trend toward …
Assistive Technology and Internet of Things for people with ADHD
I Moraiti, A Fotoglou, K Dona, A Katsimperi… - Technium Soc. Sci …, 2022 - HeinOnline
This article focuses on how people with disabilities can benefit from new technologies and in
particular assistive technology and Internet of Things Applications. Assistive Technology is …
particular assistive technology and Internet of Things Applications. Assistive Technology is …
[PDF][PDF] Smart Intrusion Detection in IoT Edge Computing Using Federated Learning.
S Fenanir, F Semchedine - Revue d'Intelligence Artificielle, 2023 - researchgate.net
With the proliferation of the Internet of Things (IoT) in various domains, concerns over
information security and user privacy have exponentially escalated. Numerous smart …
information security and user privacy have exponentially escalated. Numerous smart …
Design and development of an IoT application with visual analytics for water consumption monitoring
Water is imperative in the regular day to day existence of the human race. Household
people use water to sustain life. Nowadays, household people excessively use water …
people use water to sustain life. Nowadays, household people excessively use water …
A framework to apply the internet of things for medical care in a home environment
H Jita, V Pieterse - Proceedings of the 2018 International Conference on …, 2018 - dl.acm.org
The Internet of Things (IoT) is revolutionizing the way in which we do a number of things
including in-home medical care. An in-home care system that uses IoT technology offers a …
including in-home medical care. An in-home care system that uses IoT technology offers a …
Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future
SF Ahmed, S Shuravi, A Bhuyian, S Afrin… - arXiv preprint arXiv …, 2023 - arxiv.org
Given the exponential expansion of the internet, the possibilities of security attacks and
cybercrimes have increased accordingly. However, poorly implemented security …
cybercrimes have increased accordingly. However, poorly implemented security …
Cybersecurity in the automotive industry: a systematic literature review (SLR)
I Fernandez de Arroyabe, T Watson… - Journal of Computer …, 2023 - Taylor & Francis
This paper presents a systematic literature review (SLR) on cybersecurity in the automotive
industry. Using the R tool Bibliometrix, a total of 537 papers related to cybersecurity and the …
industry. Using the R tool Bibliometrix, a total of 537 papers related to cybersecurity and the …
[HTML][HTML] Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives
This paper investigates cybercrime in Small and Medium Enterprises (SMEs) using
Cyberspace Theory as a theoretical framework for a comprehensive analysis. Cyberspace …
Cyberspace Theory as a theoretical framework for a comprehensive analysis. Cyberspace …