[1]
|
Protocolos M2M para Ambientes Limitados no Contexto do IoT: Uma Comparação de Abordagens
|
|
NULL |
|
|
[2]
|
Synergy of Human-Centered AI and Cyber-Physical-Social Systems for Enhanced Cognitive Situation Awareness: Applications, Challenges and Opportunities
|
|
Cognitive …,
2024 |
|
|
[3]
|
Mutual combination of selected principles and technologies of Industry 4.0 and quality management methods-case study
|
|
Quality …,
2024 |
|
|
[4]
|
DAIS: deep artificial immune system for intrusion detection in IoT ecosystems
|
|
International Journal of …,
2024 |
|
|
[5]
|
Prototype of Automatic Control System for Water Temperature and Acidity in Ornamental Fish Aquarium Based on Internet of Things (IOT)
|
|
Indonesian …,
2023 |
|
|
[6]
|
The Hardware-Based User Authentication Method for Personal Emergency Rescue Systems
|
|
2023 International Russian …,
2023 |
|
|
[7]
|
Internet of Things and Its Application
|
|
… on Information and Communication Technology for …,
2023 |
|
|
[8]
|
Automatic Pet Feeder using Internet of Things
|
|
PRATIBODH,
2023 |
|
|
[9]
|
Pet Feeder using IOT
|
|
2023 |
|
|
[10]
|
A comprehensive security architecture for information management throughout the lifecycle of IoT products
|
|
Sensors,
2023 |
|
|
[11]
|
Providing a Framework for Security Management in Internet of Things
|
|
International Journal of Advanced …,
2022 |
|
|
[12]
|
Internet of Things (IoT): Applications & Challenges in Product Development
|
|
AAYAM: AKGIM Journal of …,
2022 |
|
|
[13]
|
Internet of Things based Auto- Feeding Machine for Animals
|
|
Journal of Electronics …,
2022 |
|
|
[14]
|
Recent trends in IoT: a review
|
|
Journal of Management and Service …,
2022 |
|
|
[15]
|
Privacy Preserving Internet of Things (IoT) Forensics
|
|
2022 |
|
|
[16]
|
Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets
|
|
Sensors,
2022 |
|
|
[17]
|
Trustworthy Machine Learning for Cloud-Based Internet of Things (IoT)
|
|
Transforming Management with AI, Big-Data …,
2022 |
|
|
[18]
|
Proactive Detection of Attacks on APCS Accounts Based on Analysis of User Identification Graphical Attributes
|
|
2022 International …,
2022 |
|
|
[19]
|
Security Challenges Prospective Measures In The Current Status of Internet of Things (IoT)
|
|
… International Conference on Connected Systems & …,
2022 |
|
|
[20]
|
Methods to secure access control and encryption based on physical unclonable function
|
|
2022 |
|
|
[21]
|
A Novel Bi-Key Computational Algorithm for Secure Data Transmission in Smart Meter Environment
|
|
Recent Advances in Computer Science …,
2022 |
|
|
[22]
|
IoT Based Design of an Intelligent Light System Using CoAP
|
|
… Conference on Artificial Intelligence and Sustainable …,
2021 |
|
|
[23]
|
A Cyber-Physical Data Management and Analytics System (CP-DMAS) for Smart Factories
|
|
2021 |
|
|
[24]
|
Research on Battery Monitoring Technology Based on Internet of Things
|
|
2021 International Conference on Signal Processing …,
2021 |
|
|
[25]
|
Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks
|
|
2021 IEEE SmartWorld …,
2021 |
|
|
[26]
|
Formation of a Digital Footprint Based on the Characteristics of Computer Hardware to Identity APCS Users
|
|
2021 International …,
2021 |
|
|
[27]
|
The Ethics of Psychological Artificial Intelligence: Clinical Considerations
|
|
Counseling and Values,
2021 |
|
|
[28]
|
Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm
|
|
Journal of Experimental & Theoretical Artificial …,
2021 |
|
|
[29]
|
Digital Twin (DT) in Smart Energy Systems-Systematic Literature Review of DT as a growing solution for Energy Internet of the Things (EIoT)
|
|
E3S Web of Conferences,
2021 |
|
|
[30]
|
Role and applications of IoT in materials and manufacturing industries–Review
|
|
2021 |
|
|
[31]
|
A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability
|
|
Materials Today …,
2021 |
|
|
[32]
|
Evolution of Internet of Things from blockchain to IOTA: A survey
|
|
IEEE …,
2021 |
|
|
[33]
|
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey
|
|
Sensors,
2021 |
|
|
[34]
|
Survey of DoS/DDoS attacks in IoT
|
|
2021 |
|
|
[35]
|
A Review on the Security of the Internet of Things: Challenges and Solutions
|
|
2021 |
|
|
[36]
|
A geographic routing protocol based on trunk line in VANETs
|
|
2021 |
|
|
[37]
|
Improved IPv6 sphuTikA process in 6LoWPAN base IOT network
|
|
2020 |
|
|
[38]
|
ANALYZING COLLEGE STUDENTS'PRE-KNOWLEDGE AND POST-KNOWLEDGE OF EMBEDDED SOFTWARE SECURITY AND ITS IMPACT TOWARDS …
|
|
2020 |
|
|
[39]
|
Privacy Challenges and Their Solutions in IoT
|
|
2020 |
|
|
[40]
|
Characteristics and Challenges of the Internet of Things in Entrepreneurship
|
|
2020 |
|
|
[41]
|
Cyber Physical System: Achievements and challenges
|
|
2020 |
|
|
[42]
|
Security and privacy issues of physical objects in the IoT: challenges and opportunities
|
|
2020 |
|
|
[43]
|
Proposed framework of smart transportation in Pakistan: issues, challenges, vulnerabilities, and solutions
|
|
2020 |
|
|
[44]
|
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study.
|
|
ICISSP,
2020 |
|
|
[45]
|
The Proficient Context-Aware QoS framework for Reliable Web of Things
|
|
2020 |
|
|
[46]
|
IoT Architecture
|
|
2020 |
|
|
[47]
|
Cyberentity and its consistency in the cyber-physical-social-thinking hyperspace
|
|
2020 |
|
|
[48]
|
A Survey on Architecture, Protocols and Challenges in IoT
|
|
2020 |
|
|
[49]
|
Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research
|
|
2020 |
|
|
[50]
|
A Survey of Voice Pathology Surveillance Systems Based on Internet of Things and Machine Learning Algorithms
|
|
2020 |
|
|
[51]
|
IOT BASED BLOCKCHAIN SOLUTION: COVID-19 AND DEFENSE
|
|
2019 |
|
|
[52]
|
Use of 5G Network and Standardization of Frameworks to Enhance Security of IoT Systems
|
|
2019 |
|
|
[53]
|
Access Control for Physical Objects in Internet of Things
|
|
2019 |
|
|
[54]
|
Preserving Privacy in Cyber-physical-social Systems: An Anonymity and Access Control Approach
|
|
2019 |
|
|
[55]
|
Improving Access to Science for Social Good
|
|
2019 |
|
|
[56]
|
Energy Efficient Service Embedding In IoT over PON
|
|
2019 |
|
|
[57]
|
Resilience for Smart Water Systems
|
|
2019 |
|
|
[58]
|
IOTA Viability In Healthcare Industry
|
|
2019 |
|
|
[59]
|
Emerging Pyroelectric Nanogenerators to Convert Thermal Energy into Electrical Energy
|
|
2019 |
|
|
[60]
|
A Survey of Security Issues in Internet of Things
|
|
2019 |
|
|
[61]
|
CPG-FS: A CPU Performance Graph Based Device Fingerprint Scheme for Devices Identification and Authentication
|
|
2019 |
|
|
[62]
|
Internet of Things and it's Challenges
|
|
2019 |
|
|
[63]
|
Computer network security technology based on artificial intelligence
|
|
2019 |
|
|
[64]
|
Potential Development of AES 128-bit Key Generation for LoRaWAN Security
|
|
2019 |
|
|
[65]
|
Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges
|
|
2019 |
|
|
[66]
|
Internet of Things: Security Challenges and Its Future Direction
|
|
2019 |
|
|
[67]
|
COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things
|
|
2019 |
|
|
[68]
|
Low-Power AES Data Encryption Architecture for a LoRaWAN
|
|
2019 |
|
|
[69]
|
FUTURE INTERNET OF THINGS AND IT'S CHALLENGES
|
|
International Journal For Recent Developments in Science & Technology,
2019 |
|
|
[70]
|
CATSWoTS: Context Aware Trustworthy Social Web of Things System
|
|
2019 |
|
|
[71]
|
An approach to develop the smart health using Internet of Things and authentication based on biometric technology
|
|
Future Generation Computer Systems,
2019 |
|
|
[72]
|
Key Technology for Intelligent Interaction Based on Internet of Things
|
|
2019 |
|
|
[73]
|
Intrusion detection systems in the Internet of things: A comprehensive investigation
|
|
2019 |
|
|
[74]
|
Managing Cybersecurity Risks of SCADA Networks of Critical Infrastructures in the IoT Environment
|
|
2019 |
|
|
[75]
|
Hybrid Energy Harvesters: Toward Sustainable Energy Harvesting
|
|
2019 |
|
|
[76]
|
Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey
|
|
2019 |
|
|
[77]
|
A Chaotic Cryptographic Solution for Low-Range Wireless Communications in Industry 4.0
|
|
2019 |
|
|
[78]
|
LoRaWAN 物聯網之低功耗資料加密方法
|
|
2019 |
|
|
[79]
|
Um estudo e avaliação do desempenho de Protocolos de Aplicação para a Internet das Coisas
|
|
2019 |
|
|
[80]
|
A Privacy Aware Architecture for IoT Enabled Systems
|
|
2019 |
|
|
[81]
|
A Web of Things Architecture Focusing on Trust
|
|
2019 |
|
|
[82]
|
DoS and DDoS vulnerability of IoT: A review
|
|
2019 |
|
|
[83]
|
FRAMEWORK FOR BUSINESS VALUE OF SOCIAL INTERNET OF THINGS
|
|
2019 |
|
|
[84]
|
Service embedding in IoT networks
|
|
2019 |
|
|
[85]
|
A Selective Encryption and fraud detection on Multimedia Files for data security with Resource Optimization Technique
|
|
Journal of Emerging Technologies and Innovative Research,
2018 |
|
|
[86]
|
TÜRK LOJİSTİK FİRMALARINDAN BİRİNDE ENDÜSTRİ 4.0'A GEÇİŞ
|
|
2018 |
|
|
[87]
|
Smart Surveillance Using Internet of Things
|
|
2018 |
|
|
[88]
|
A Survey on Internet of Things
|
|
2018 |
|
|
[89]
|
TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
|
|
2018 |
|
|
[90]
|
Modified and Improved IPv6 Header Compression (MIHC) Scheme for 6LoWPAN
|
|
Wireless Personal Communications,
2018 |
|
|
[91]
|
Literature review of Industry 4.0 and related technologies
|
|
Journal of Intelligent Manufacturing,
2018 |
|
|
[92]
|
Securing the internet of things in the age of machine learning and software-defined networking
|
|
2018 |
|
|
[93]
|
AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments
|
|
2018 |
|
|
[94]
|
Development of a Secure, Heterogeneous Cloud Robotics Infrastructure: Implementing a Mesh VPN and Robotic File System Security Practices
|
|
2018 |
|
|
[95]
|
IoT Cyber Security—A Discourse on the Human Dimension
|
|
Internet of Things, for Things, and by Things (pp. 221-228),
2018 |
|
|
[96]
|
Security in Internet of Things: Issues, Challenges and Solutions
|
|
Recent Trends in Data Science and Soft Computing,
2018 |
|
|
[97]
|
Cyberintelligence for IoT
|
|
2018 |
|
|
[98]
|
Securing the Internet of Things: New Perspectives and Research Challenges
|
|
2018 |
|
|
[99]
|
An Insight into Current IoT Security Methods
|
|
2018 |
|
|
[100]
|
Ontology-Based Personalized Telehealth Scheme in Cloud Computing
|
|
Web Services – ICWS 2018,
2018 |
|
|
[101]
|
Trust management for SOA based social WoT system
|
|
2018 |
|
|
[102]
|
THE TRANSITION TO INDUSTRY 4.0 IN ONE OF THE TURKISH LOGISTICS COMPANY
|
|
INTERNATIONAL JOURNAL OF 3D PRINTING TECHNOLOGIES AND DIGITAL INDUSTRY,
2018 |
|
|
[103]
|
Iiot and big data in industry 4.0: gather, display and evaluate data
|
|
2018 |
|
|
[104]
|
Security Analysis of RPL Protocol
|
|
2018 |
|
|
[105]
|
Internet of Things, for Things, and by Things
|
|
2018 |
|
|
[106]
|
INTERNET OF THING (IoT): AN OVERVIWE BASED ON SECURITY CHALLENGE
|
|
2018 |
|
|
[107]
|
Internet of Things Applications@ Urban Spaces (Tel Aviv Smart City: A Case Study)
|
|
Information and Communication Technology for Sustainable Development,
2018 |
|
|
[108]
|
Internet of Things (IoT): Research, Architectures and Applications
|
|
2018 |
|
|
[109]
|
Implementation of Cyber-Physical Production Systems for Quality Prediction and Operation Control in Metal Casting
|
|
Sensors,
2018 |
|
|
[110]
|
Secure IoT: An Improbable Reality
|
|
2017 |
|
|
[111]
|
A study of the Internet of Things in the oil and gas industry
|
|
2017 |
|
|
[112]
|
Security Management perspective for Internet of Things
|
|
International Journal of Engineering Science Invention,
2017 |
|
|
[113]
|
SECURITY AND PRIVACY OF CYBER PHYSICAL SYSTEMS IN IOT USING CLOUD INFRASTRUCTURE
|
|
2017 |
|
|
[114]
|
A Novel Bagging C4. 5 Algorithm Based on Wrapper Feature Selection for Supporting Wise Clinical Decision Making
|
|
Journal of Biomedical Informatics,
2017 |
|
|
[115]
|
Protection of enterprise resources: A novel security framework
|
|
2017 |
|
|
[116]
|
Nesnelerin İnternetinin Kişisel, Kurumsal ve Ulusal BilgiGüvenliği Açısından İncelenmesi Examination of Internet of Things in Terms of Personal, Enterprise and National Information Security
|
|
TÜRKİYE BİLİŞİM VAKFI BİLGİSAYAR BİLİMLERİ VE MÜHENDİSLİĞİ DERGİSİ,
2017 |
|
|
[117]
|
Nesnelerin İnternetinin Kişisel, Kurumsal ve Ulusal Bilgi Güvenliği Açısından İncelenmesi
|
|
TBV Journal of Computer Science and Engineering,
2017 |
|
|
[118]
|
Development of Android/IOS Based Application to Access Aadhar Database For Utilization In General Elections-Aadhar Based Electoral Application
|
|
International e-Journal For Science And Research,
2017 |
|
|
[119]
|
Swarm Intelligence via the Internet of Things and the Phenomenological Turn
|
|
Philosophies,
2017 |
|
|
[120]
|
Utilizing the Internet of Things (IoT) Technologies in the Implementation of Industry 4.0
|
|
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017,
2017 |
|
|
[121]
|
A review of the smart world
|
|
Future Generation Computer Systems,
2017 |
|
|
[122]
|
Low Cost Internet of Things Approach for Security Surveillance Using Raspberry-Pi
|
|
2017 |
|
|
[123]
|
Enhancing the security of IoT enabled robotics: Protecting TurtleBot file system and communication
|
|
2017 |
|
|
[124]
|
Security Issues and Its Countermeasures in Examining the Cloud-Assisted IoT
|
|
2017 |
|
|
[125]
|
Co-engineering safety and security in risk-prone smart work environments
|
|
2017 |
|
|
[126]
|
A Triangular NodeTrix Visualization Interface for Overlapping Social Community Structures of Cyber-Physical-Social Systems in Smart Factories
|
|
2017 |
|
|
[127]
|
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
|
|
Future Generation Computer Systems,
2017 |
|
|
[128]
|
System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems
|
|
ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on LCETES 2015, Special Issue on ACSD 2015 and Special Issue on Embedded Devise Forensics and Security,
2017 |
|
|
[129]
|
An INTERNET of THINGS APPROACH for SECURITY SURVEILLANCE using RASPBERRY-PI–A Survey
|
|
International Research Journal of Engineering and Technology,
2017 |
|
|
[130]
|
A Flexible Wildcard-Pattern Matching Accelerator via Simultaneous Discrete Finite Automata
|
|
2017 |
|
|
[131]
|
Internet of things security
|
|
2017 |
|
|
[132]
|
IoT Security Adoption into Business Processes: A Socio-Technical View
|
|
2017 |
|
|
[133]
|
A Systematic Literature Review on the Security Challenges of Internet of Things and their Classification
|
|
2017 |
|
|
[134]
|
Dynamic network configuration in the Internet of Things
|
|
2017 |
|
|
[135]
|
Securing the Internet of Things
|
|
Fog for 5G and IoT,
2017 |
|
|
[136]
|
An Adaptable, Fog-Computing Machine-to-Machine Internet of Things Communication Framework
|
|
Dissertation, Case Western Reserve University,
2017 |
|
|
[137]
|
Internet of Things Approach for Motion Detection and Motion Tracking Using Raspberry Pi, Pir Sensor and Dropbox
|
|
2017 |
|
|
[138]
|
A effective Encryption with Resource Optimization on Multimedia Files for Security
|
|
International Journal for Research in Engineering Application & Management,
2017 |
|
|
[139]
|
11 Securing the Internet of Things: Need for Fog Computing
|
|
2017 |
|
|
[140]
|
Secure IoT: An Improbable Reality.
|
|
2017 |
|
|
[141]
|
Internet of Things based and FACE based Authentication using RASPBERRY-PI on Open-Source Platform
|
|
2017 |
|
|
[142]
|
CYBER-SECURITY RELATED COSTS IN THE INTERNET OF THINGS ERA
|
|
International Conference on Management and Industrial Engineering,
2017 |
|
|
[143]
|
A review on security problems and measures of Internet of Things
|
|
2017 |
|
|
[144]
|
Securing the Internet of Things: Need for a New Paradigm and Fog Computing
|
|
Fog for 5G and IoT,
2017 |
|
|
[145]
|
Attribute Based Encryption—A Data Centric Approach for Securing Internet of Things (IoT)
|
|
Advanced Science Letters,
2017 |
|
|
[146]
|
Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things
|
|
2017 |
|
|
[147]
|
THE RISE OF INTERNET OF THING AND THE RISK OF THREATS
|
|
2017 |
|
|
[148]
|
Fog for 5G and IoT
|
|
2017 |
|
|
[149]
|
Internet of things protocols comparison, architecture, vulnerabilities and security: State of the art
|
|
Proceedings of the 2nd International …,
2017 |
|
|
[150]
|
Smartphones, Drones and IoT: Security and Privacy in Heterogeneous Smart Devices
|
|
2017 |
|
|
[151]
|
Cryptography Arbitration: Security Complexities of Cloud Enabled IoT in Europe and Beyond
|
|
… on Internet of Things and Big Data,
2016 |
|
|
[152]
|
Towards Distributed and Context-Aware Human-Centric Cyber-Physical Systems
|
|
Advances in Service-Oriented and Cloud Computing,
2016 |
|
|
[153]
|
An IOT Based Motion Detection using Raspberry PI
|
|
i-manager's Journal on Cloud Computing,
2016 |
|
|
[154]
|
6LOWPAN HEADER COMPRESSES WITH END-TO-END HYBRID ROUTE-OVER USING CROSS-LAYER AND ADAPTIVE BACKOFF EXPONENT
|
|
2016 |
|
|
[155]
|
Cryptography Arbitration: Security Complexities of Cloud Enabled IoT in Europe and Beyond.
|
|
2016 |
|
|
[156]
|
A Video Sensing Oriented Format-compliant Entropy Coding Encryption Scheme and Embedded Video Processing System
|
|
2016 |
|
|
[157]
|
A survey on Internet of Things architectures
|
|
Journal of King Saud University - Computer and Information Sciences,
2016 |
|
|
[158]
|
Evolving authentication design considerations for the internet of biometric things (IoBT)
|
|
2016 |
|
|
[159]
|
A light weight and secure video conferencing scheme utilizing public network
|
|
Multimedia Tools and Applications,
2016 |
|
|
[160]
|
Pick a right puppy from a litter, toward a secure controller framework in physical, human and cyber triad
|
|
2016 |
|
|
[161]
|
Secure IoT framework and 2D architecture for End-To-End security
|
|
The Journal of Supercomputing,
2016 |
|
|
[162]
|
Survey of Real-time Processing Technologies of IoT Data Streams
|
|
Journal of Information Processing,
2016 |
|
|
[163]
|
Big Data Approach in an ICT Agriculture Application
|
|
New Approaches in Intelligent Control,
2016 |
|
|
[164]
|
A survey: Cyber-physical-social systems and their system-level design methodology
|
|
Future Generation Computer Systems,
2016 |
|
|
[165]
|
Το διαδίκτυο των πραγμάτων και οι εφαρμογές του
|
|
2016 |
|
|
[166]
|
A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints
|
|
2016 |
|
|
[167]
|
Research Studies on the Agricultural and Commercial Field
|
|
Advanced Applied Informatics (IIAI-AAI), 2015 IIAI 4th International Congress on,
2015 |
|
|
[168]
|
Towards Collaborative Human-Centric CPS
|
|
2015 |
|
|
[169]
|
基于 PKI 和 CPK 的 RFID 系统混合密钥管理机制研究
|
|
电子科技大学学报,
2015 |
|
|
[170]
|
'Things' in the Internet of Things: Towards a Definition
|
|
International Journal of Internet of Things,
2015 |
|
|
[171]
|
An Internet of things approach for motion detection using Raspberry Pi
|
|
Intelligent Computing and Internet of Things (ICIT), 2014 International Conference on,
2015 |
|
|
[172]
|
FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things
|
|
2015 |
|
|
[173]
|
Securing the Internet of Things with Responsive Artificial Immune Systems
|
|
Proceedings of the 2015 on Genetic and Evolutionary Computation Conference,
2015 |
|
|
[174]
|
A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft
|
|
Journal of Network and Computer Applications,
2015 |
|
|
[175]
|
Internet of Things (IoT): Definitions, Challenges and Recent Research Directions
|
|
2015 |
|
|
[176]
|
Prevent Malicious Controller in a Physical, Human and Cyber Triad
|
|
2015 |
|
|
[177]
|
AUTOMAÇÃO NA INDÚSTRIA METALURGICA E DE MINERAÇÃO COM RFID: UMA REVISÃO INTEGRATIVA
|
|
2015 |
|
|
[178]
|
Poster: Toward a secure controller framework for flight in physical human and cyber triad
|
|
2015 |
|
|
[179]
|
基于环境感知的防泄漏多秘密共享方案
|
|
2015 |
|
|
[180]
|
网络化信息系统体系对抗试验环境安全性结构
|
|
指挥信息系统与技术,
2015 |
|
|
[181]
|
物联网技术及安全问题
|
|
上海理工大学学报: 社会科学版,
2015 |
|
|
[182]
|
Things' in the internet of things: towards a definition
|
|
2015 |
|
|
[183]
|
Research on Intelligent Regulation of Ship-to-Ship Crude Oil Transfer at Sea Based on Internet of Things
|
|
2014 |
|
|
[184]
|
Internet of Things: The Argument for Smart Forensics
|
|
2014 |
|
|
[185]
|
Future Internet of Things: open issues and challenges
|
|
Wireless Networks,
2014 |
|
|
[186]
|
A Study of Smart Grid Communication Architecture
|
|
Proceedings of International Conference on Computer Science and Information Technology,
2014 |
|
|
[187]
|
Big data application to the vegetable production and distribution system
|
|
Signal Processing & its Applications (CSPA), 2014 IEEE 10th International Colloquium on,
2014 |
|
|
[188]
|
Adaptive Security for the Internet of Things Reference Model
|
|
Norsk informasjonssikkerhetskonferanse (NISK),
2014 |
|
|
[189]
|
Embedded Micro Application Server in Intel Mini-ITX DN2800MT for Interaction with the ARM Cortex-M3
|
|
2014 |
|
|
[190]
|
IoT-security Approach Analysis for the Novel Nutrition-Based Vegetable Production and Distribution System
|
|
Advanced Applied Informatics (IIAIAAI), 2014 IIAI 3rd International Conference on,
2014 |
|
|
[191]
|
A security communication model based on certificateless online/offline signcryption for Internet of Things
|
|
Security and Communication Networks,
2014 |
|
|
[192]
|
What the Design Theory of Social-Cyber-Physical Systems Must Describe, Explain and Predict?
|
|
An Anthology of Theories and Models of Design,
2014 |
|
|
[193]
|
Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design
|
|
arXiv preprint arXiv:1401.6375,
2014 |
|
|
[194]
|
一种基于谱聚类分析的物联网节点安全控制域划分算法
|
|
传感技术学报,
2014 |
|
|
[195]
|
A video sensing oriented speed adjustable fast multimedia encryption scheme and embedded system
|
|
Computing, Communications and IT Applications Conference (ComComAp), 2014 IEEE,
2014 |
|
|
[196]
|
A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints
|
|
Computing, Communications and IT Applications Conference (ComComAp), 2014 IEEE,
2014 |
|
|
[197]
|
Design of complex event-processing IDS in internet of things
|
|
2014 |
|
|
[198]
|
A New Approach to the Vegable Production and Distribution System
|
|
2014 |
|
|
[199]
|
Unit and ubiquitous internet of things
|
|
2013 |
|
|
[200]
|
Norwegian Information Security Conference Norsk Informasjonssikkerhetskonferanse
|
|
2013 |
|
|
[201]
|
The Study and Application of the IoT in Pet Systems
|
|
Advances in Internet of Things,
2013 |
|
|
[202]
|
A Survey on the Internet of Things Security
|
|
Computational Intelligence and Security (CIS), 2013 9th International Conference on,
2013 |
|
|
[203]
|
A Network Storage Framework for Internet of Things
|
|
Procedia Computer Science,
2013 |
|
|
[204]
|
The Regulation of Ship-to-Ship Crude Oil Transfer at Sea: Is There A Need for an Intelligent Monitoring System?
|
|
Journal of Applied Sciences,
2013 |
|
|
[205]
|
On the features and challenges of security and privacy in distributed internet of things
|
|
Computer Networks,
2013 |
|
|
[206]
|
Finnish Perspectives for the IOT
|
|
American Journal of Networks and Communications,
2013 |
|
|
[207]
|
Department of Computer and Communication Systems, Faculty of Engineering, Universiti Putra Malaysia, UPM Serdang, 43400 Selangor, Malaysia
|
|
Sensing Technology (ICST), 2013 Seventh International Conference on,
2013 |
|
|
[208]
|
基于物联网技术的海上原油过驳智慧监管研究
|
|
宁波大学学报: 理工版,
2013 |
|
|
[209]
|
NIK 2013
|
|
2013 |
|
|
[210]
|
Embedded Micro Application Server in Intel MinilTX DN2800MT for Interaction with the ARM Cortex-M3
|
|
2013 |
|
|
[211]
|
The regulation of ship to ship crude oil transfer at sea: is there a need for an intelligent monitoring system
|
|
2013 |
|
|
[212]
|
Towards a History–Based Authentication and Intrusion Detection Mechanism
|
|
2013 |
|
|
[213]
|
物联网安全关键技术及其应用研究
|
|
大庆师范学院学报,
2012 |
|
|
[214]
|
Beyond advanced mechatronics: new design challenges of Social-Cyber-Physical systems
|
|
Proceedings of the ACCM-Workshop on ?Mechatronic Design ,
2012 |
|
|
[215]
|
Análisis de Seguridad para la Autenticación y Privacidad en Entornos IoT
|
|
Bustamante, CAO Rivera
|
|
|
[216]
|
A REVIEW OF SECURITY CONCERNS OF PHYSICAL OBJECTSUSINGINTERNET OF THINGS
|
|
|
|
|
[217]
|
INTERNET OF THINGS (IOT)
|
|
|
|
|
[218]
|
Strengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions
|
|
|
|
|
[219]
|
Vulnerabilities to Internet of Things and Current State of the Art of Security Architecture
|
|
|
|
|
[220]
|
IOT Architecture, Challenges and Opportunities
|
|
|
|
|
[221]
|
INTERNET OF THINGS: VISION, TECHNOLOGIES AND CAPABILITIES FOR EFFECTIVE LEARNING AND RESEARCH WITH SECURITY ISSUES
|
|
|
|
|
[222]
|
Guardians of the iot realm: a comparative analysis of cryptographic security solutions for bolstering IoT device networks
|
|
|
|
|