Results 31 to 40 of about 13,790 (272)
CoAP-DoS: An IoT Network Intrusion Data Set [PDF]
The need for secure Internet of Things (IoT) devices is growing as IoT devices are becoming more integrated into vital networks. Many systems rely on these devices to remain available and provide reliable service.
Jared Mathews+2 more
semanticscholar +1 more source
IoT Security: Threats and Possible Solutions [PDF]
Despite IoT being in the spotlight for several years now, Gartner still predicts a five time increase in number of devices from 2018 to 2028 [1], up to 1.9 billion units, which further intensifies the need for security among IoT nodes. Through the years,
Andrei-Robert CAZACU
doaj +1 more source
IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials
Many IoT use cases can benefit from group communication, where a user requests an IoT resource and this request can be handled by multiple IoT devices, each of which may respond back to the user.
Nikos Fotiou+3 more
doaj +1 more source
Is CoAP Congestion Safe? [PDF]
A huge number of Internet of Things (IoT) devices are expected to be connected to the Internet in the near future. The Constrained Application Protocol (CoAP) has been increasingly deployed for wide-area IoT communication. It is crucial to understand how the specified CoAP congestion control algorithms perform.
Järvinen, Ilpo Johannes+3 more
openaire +3 more sources
Fuzzy Congestion Control and Avoidance for CoAP in IoT Networks
In Internet of Things (IoT) networks, congestion is growing with the increasing number of devices, and a large amount of collected data must be transferred. Congestion control is one of the most significant challenges for such networks.
Thieu Nga Pham+2 more
doaj +1 more source
Avoiding Congestion for Coap Burst Traffic
Congestion is an important issue in Internet of Things (IoT) networks with constrained devices and a growing number of applications. This paper investigated the problem of congestion control for burst traffic in such networks.
Thi Thuy Duong Le+2 more
semanticscholar +1 more source
Stochastic Image Transmission with CoAP for Extreme Environments [PDF]
Communication in extreme environments is an important research topic for various use cases including environmental monitoring. A typical example is underwater acoustic communication for 6G mobile networks.
Erina Takeshita+6 more
semanticscholar +1 more source
COAP: Memory-Efficient Training with Correlation-Aware Gradient Projection [PDF]
Training large-scale neural networks in vision, and multimodal domains demands substantial memory resources, primarily due to the storage of optimizer states.
Jinqi Xiao+6 more
openalex +2 more sources
Machine Learning-Based DoS Amplification Attack Detection against Constrained Application Protocol
This paper discusses the Internet of Things (IoT) and the security challenges associated with it. IoT is a network of interconnected devices that share information.
Sultan M. Almeghlef+3 more
doaj +1 more source
RCOAP: A Rate Control Scheme for Reliable Bursty Data Transfer in IoT Networks
The Internet Engineering Task Force (IETF) standardized the Constrained Application Protocol (CoAP) for Internet of Things (IoT) devices to meet the demands of IoT applications.
Dang Hai Hoang, Thi Thuy Duong Le
doaj +1 more source