[HTML][HTML] Key communication technologies, applications, protocols and future guides for IoT-assisted smart grid systems: A review

MO Qays, I Ahmad, A Abu-Siada, ML Hossain… - Energy Reports, 2023 - Elsevier
Towards addressing the concerns of conventional power systems including reliability and
security, establishing modern Smart Grids (SGs) has been given much attention by the …

[HTML][HTML] Applying spring security framework with KeyCloak-based OAuth2 to protect microservice architecture APIs: a case study

A Chatterjee, A Prinz - Sensors, 2022 - mdpi.com
In this study, we implemented an integrated security solution with Spring Security and
Keycloak open-access platform (SSK) to secure data collection and exchange over …

Sftsdh: Applying spring security framework with TSD-based oauth2 to protect microservice architecture apis

A Chatterjee, MW Gerdes, P Khatiwada, A Prinz - IEEE Access, 2022 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) combines medical devices and applications that use
network technologies to connect healthcare information systems (HIS). IoMT is reforming the …

IoT: What is, Concern, and How to Secure? A Systematic Literature Review

T Estella, NAI Ghayatrie, A Levina… - 2022 6th International …, 2022 - ieeexplore.ieee.org
The Internet revolution is inevitable as people are constantly creating new and innovative
inventions in both hardware and software. The Internet revolution has led to the …

[HTML][HTML] A hybrid IoT security model of MQTT and UMA

KS Aloufi, OH Alhazmi - Communications and Network, 2020 - scirp.org
IoT applications are promising for future daily activities; therefore, the number of IoT
connected devices is expected to reach billions in the coming few years. However, IoT has …

IoT cloud-based services in network management solutions

O Jukić, I Heđi, E Ciriković - 2020 43rd International …, 2020 - ieeexplore.ieee.org
Main goal of research in this paper is to improve resilience of network management in
networks with IoT (Internet of Things) devices. To set up a network with many IoT devices in …

[HTML][HTML] Performance analysis of the hybrid MQTT/UMA and restful IoT security model

OH Alhazmi, KS Aloufi - Advances in Internet of Things, 2021 - scirp.org
Internet of Things (IoT) environments are being deployed all over the globe. They have the
potential to form solutions to applications, from small scale applications to national and …

Performance analysis of the hybrid iot security model of mqtt and uma

KS Aloufi, OH Alhazmi - arXiv preprint arXiv:2005.06595, 2020 - arxiv.org
IoT applications are promising for future daily activities; therefore, the number of IoT
connected devices is expected to reach billions in the coming few years. However, IoT has …

Avaliação de desempenho de protocolos de mensagens com arquitetura publish/subscribe no ambiente de computação em nevoeiro: Um estudo sobre desempenho …

W dos Reis Bezerra, CB Westphall - Anais do XI Workshop de …, 2020 - sol.sbc.org.br
Soluções seguras para IoT e agronegócios são primordiais. Entretanto se faz necessária a
adoção da tecnologia adequada para o desenvolvimento de sistemas nesta área. Com foco …

Дослідження та програмна реалізація методів та засобів розпізнавання голосових команд

ОЮ Бережний - 2022 - eir.zp.edu.ua
UK: Об'єкт дослідження–процес розпізнавання голосових команд та керування за їх
допомогою. Предмет дослідження–методи та засоби захоплення, аналізу та …