Differential privacy techniques for cyber physical systems: A survey
MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …
development of information and communication technologies (ICT). With the provision of …
Design of traffic emergency response system based on internet of things and data mining in emergencies
Z Liu, C Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Urban emergencies are hard to avoid. Traffic emergency response after an incident plays an
important role in reducing losses and is a key link in urban emergency management …
important role in reducing losses and is a key link in urban emergency management …
Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment
LFA Roman, PRL Gondim - Ad hoc networks, 2020 - Elsevier
Abstract The Internet of Things (IoT) has developed very rapidly in recent years, becoming
increasingly complex. The communication things networks (CTNs) is a very important …
increasingly complex. The communication things networks (CTNs) is a very important …
Integrated smart door system in apartment room based on internet
M Husni, HT Ciptaningtyas, RR Hariadi… - Telkomnika …, 2019 - telkomnika.uad.ac.id
Abstract Internet of Things (IoT) is technology which provides communication between
machines without human intervention. There are many applications that implement IoT …
machines without human intervention. There are many applications that implement IoT …
Internet of things architectural elements, challenges and future directions
The Internet of Things (IoT) is an emerging paradigm that seamlessly integrates smart
devices, sensor nodes, network gateways, actuators, radio frequency identification and …
devices, sensor nodes, network gateways, actuators, radio frequency identification and …
Termo: Smart air conditioner controller integrated with temperature and humidity sensor
Air Conditioner is widely used in residential and commercial buildings. The air conditioner
has the highest power consumption. The aspect of thermal comfort that affects human life …
has the highest power consumption. The aspect of thermal comfort that affects human life …
Pandemic management using Internet of Things and Big Data–a security and privacy perspective
KS Arvind, S Vanitha, KS Suganya - IoT and Big Data Analytics for …, 2022 - taylorfrancis.com
Pandemic management via technologies like Internet of Things, artificial intelligence, 5G,
Blockchain have made huge impact across the world in these difficult times. The current …
Blockchain have made huge impact across the world in these difficult times. The current …
Efficient routing protocol for location privacy preserving in internet of things
R Kaur, K Verma, SK Jain, N Kesswani - International Journal of …, 2019 - igi-global.com
Internet of Things is a norm which has expanded very swiftly with high magnitude of
heterogeneity and functionalities. Security and privacy became the prime factors of Internet …
heterogeneity and functionalities. Security and privacy became the prime factors of Internet …
Authentication protocol built from a chaotic cryptosystem for a fog and cloud-based CWD-WPT charging station
LFA Roman, P de Lira Gondim - 2021 International Wireless …, 2021 - ieeexplore.ieee.org
In vehicular ad-hoc networks for electric vehicles (EV), the possibility of charging EVs while
driving (CWD) with the use of wireless power transfer (WPT) technology offers advantages …
driving (CWD) with the use of wireless power transfer (WPT) technology offers advantages …
Graph convolutional networks-based robustness optimization for scale-free Internet of Things
Y Peng, C Liu, Y Wu, S Liu, K Wang - Intelligent Data Analysis, 2022 - content.iospress.com
Abstract The Internet of Things (IoT) devices have limited resources and are vulnerable to
attacks, so optimizing their network topology to resist random failures and malicious attacks …
attacks, so optimizing their network topology to resist random failures and malicious attacks …