Results 151 to 160 of about 2,276 (160)
Composing Continuous Services in a CoAP-based IoT
Benjamin Billet +2 more
openalex +1 more source
A vulnerability detection method for IoT protocol based on parallel fuzzy algorithm. [PDF]
Han Y, Wang P, Kang C, Lin J, Fan W.
europepmc +1 more source
A model to optimize maintenance through implementing industry 4.0 technologies. [PDF]
Essalih S +4 more
europepmc +1 more source
Field-Programmable Gate Array-Based Implementation of Zero-Trust Stream Data Encryption for Enabling 6G-Narrowband Internet of Things Massive Device Access. [PDF]
Tsai WC.
europepmc +1 more source
A novel IoT-device management platform for on-the-fly generation of user interface via manifest-file addressing heterogeneity. [PDF]
Gupta N +3 more
europepmc +1 more source
An Adaptive Framework for Intrusion Detection in IoT Security Using MAML (Model-Agnostic Meta-Learning). [PDF]
Alrayes FS, Amin SU, Hakami N.
europepmc +1 more source

