[HTML][HTML] Key communication technologies, applications, protocols and future guides for IoT-assisted smart grid systems: A review
Towards addressing the concerns of conventional power systems including reliability and
security, establishing modern Smart Grids (SGs) has been given much attention by the …
security, establishing modern Smart Grids (SGs) has been given much attention by the …
[HTML][HTML] Applying spring security framework with KeyCloak-based OAuth2 to protect microservice architecture APIs: a case study
A Chatterjee, A Prinz - Sensors, 2022 - mdpi.com
In this study, we implemented an integrated security solution with Spring Security and
Keycloak open-access platform (SSK) to secure data collection and exchange over …
Keycloak open-access platform (SSK) to secure data collection and exchange over …
Sftsdh: Applying spring security framework with TSD-based oauth2 to protect microservice architecture apis
The Internet of Medical Things (IoMT) combines medical devices and applications that use
network technologies to connect healthcare information systems (HIS). IoMT is reforming the …
network technologies to connect healthcare information systems (HIS). IoMT is reforming the …
IoT: What is, Concern, and How to Secure? A Systematic Literature Review
T Estella, NAI Ghayatrie, A Levina… - 2022 6th International …, 2022 - ieeexplore.ieee.org
The Internet revolution is inevitable as people are constantly creating new and innovative
inventions in both hardware and software. The Internet revolution has led to the …
inventions in both hardware and software. The Internet revolution has led to the …
[HTML][HTML] A hybrid IoT security model of MQTT and UMA
KS Aloufi, OH Alhazmi - Communications and Network, 2020 - scirp.org
IoT applications are promising for future daily activities; therefore, the number of IoT
connected devices is expected to reach billions in the coming few years. However, IoT has …
connected devices is expected to reach billions in the coming few years. However, IoT has …
IoT cloud-based services in network management solutions
Main goal of research in this paper is to improve resilience of network management in
networks with IoT (Internet of Things) devices. To set up a network with many IoT devices in …
networks with IoT (Internet of Things) devices. To set up a network with many IoT devices in …
[HTML][HTML] Performance analysis of the hybrid MQTT/UMA and restful IoT security model
OH Alhazmi, KS Aloufi - Advances in Internet of Things, 2021 - scirp.org
Internet of Things (IoT) environments are being deployed all over the globe. They have the
potential to form solutions to applications, from small scale applications to national and …
potential to form solutions to applications, from small scale applications to national and …
Performance analysis of the hybrid iot security model of mqtt and uma
KS Aloufi, OH Alhazmi - arXiv preprint arXiv:2005.06595, 2020 - arxiv.org
IoT applications are promising for future daily activities; therefore, the number of IoT
connected devices is expected to reach billions in the coming few years. However, IoT has …
connected devices is expected to reach billions in the coming few years. However, IoT has …
Avaliação de desempenho de protocolos de mensagens com arquitetura publish/subscribe no ambiente de computação em nevoeiro: Um estudo sobre desempenho …
W dos Reis Bezerra, CB Westphall - Anais do XI Workshop de …, 2020 - sol.sbc.org.br
Soluções seguras para IoT e agronegócios são primordiais. Entretanto se faz necessária a
adoção da tecnologia adequada para o desenvolvimento de sistemas nesta área. Com foco …
adoção da tecnologia adequada para o desenvolvimento de sistemas nesta área. Com foco …
Дослідження та програмна реалізація методів та засобів розпізнавання голосових команд
ОЮ Бережний - 2022 - eir.zp.edu.ua
UK: Об'єкт дослідження–процес розпізнавання голосових команд та керування за їх
допомогою. Предмет дослідження–методи та засоби захоплення, аналізу та …
допомогою. Предмет дослідження–методи та засоби захоплення, аналізу та …