Securing 5G‐IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation

AS Rajawat, P Bedi, SB Goyal… - Mathematical …, 2021 - Wiley Online Library
In terms of growth, effect, and capability, the 5G‐enabled Internet of Things (IoT) is
incredible. The volume of data distributed and processed by IoT (Internet of Things) systems …

[HTML][HTML] AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance

A Khurshid, S Raza - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things (IoT) network is comprised of heterogeneous devices which
are part of critical infrastructures throughout the world. To enable end-to-end security, the …

Trusted execution environment hardware by isolated heterogeneous architecture for key scheduling

TT Hoang, C Duran, R Serrano, M Sarmiento… - IEEE …, 2022 - ieeexplore.ieee.org
A Trusted Execution Environment (TEE) sets a platform to secure applications based on the
Chain-of-Trust (CoT). The starting point of the CoT is called the Root-of-Trust (RoT) …

A threat modeling framework for IoT-Based botnet attacks

H Jin, GH Jeon, HWA Choi, S Jeon, JT Seo - Heliyon, 2024 - cell.com
Abstract Internet of Things (IoT) devices are much closer to users than personal computers
used in traditional computing environments. Due to prevalence of IoT devices, even if they …

TZEAMM: An Efficient and Secure Active Measurement Method Based on TrustZone

X Liu, Y Lai, J Liu, S Luo - Security and Communication …, 2023 - Wiley Online Library
With the rapid development of computer and communication technology, embedded
systems are widely used in smart devices. The increasing connectivity of these systems and …

Cryptographic security for IOT applications in 5G

MV Lakshmi, V Ganesan - Computer Science Engineering, 2024 - taylorfrancis.com
5G being one of the most alluring new wireless technologies, will work flawlessly with IoT
applications because of its lower latency and efficient better data rates. Additionally, 5G …

Application Self-Protection and its Use in SCADA Systems in Critical Infrastructures: A Systematic Mapping of the Literature

DA Manrique, C Neil… - 2024 IEEE Biennial …, 2024 - ieeexplore.ieee.org
Context: Industrial systems are facing an increasing number of cybersecurity threats,
especially with the rise of Industry 4.0 and the integration of communication protocols. As a …

Ejecución presupuestal y calidad de gastos en el Hospital II-2 Tarapoto-2023

CN Amasifuen Perez - 2023 - repositorio.ucv.edu.pe
La investigación tuvo como objetivo determinar la relación entre la ejecución presupuestal y
calidad de gastos en el Hospital II-2 Tarapoto 2023. La investigación fue tipo básica, diseño …

[PDF][PDF] Usando as propriedades físicas dos componentes dos medidores inteligentes para torná-los mais seguros

AER Rincón - objdig.ufrj.br
Os avanços tecnológicos em hardware e software durante as últimas décadas permitiram e
incentivaram a proliferação de dispositivos inteligentes integrados a diferentes sistemas …

[PDF][PDF] Research Article Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation

AS Rajawat, P Bedi, SB Goyal, PK Shukla, SS Jamal… - 2021 - academia.edu
In terms of growth, effect, and capability, the 5G-enabled Internet of ings (IoT) is incredible. e
volume of data distributed and processed by IoT (Internet of ings) systems that trust …