Congestion control in internet of things (IoT) using auction theory. [PDF]
Li Z, Zhao Y.
europepmc +1 more source
A vulnerability detection method for IoT protocol based on parallel fuzzy algorithm. [PDF]
Han Y, Wang P, Kang C, Lin J, Fan W.
europepmc +1 more source
Internet of Things-Based Automated Solutions Utilizing Machine Learning for Smart and Real-Time Irrigation Management: A Review. [PDF]
Nsoh B +10 more
europepmc +1 more source
An Adaptive Framework for Intrusion Detection in IoT Security Using MAML (Model-Agnostic Meta-Learning). [PDF]
Alrayes FS, Amin SU, Hakami N.
europepmc +1 more source
A Comprehensive Survey on Intrusion Detection Systems for Healthcare 5.0: Concepts, Challenges, and Practical Applications. [PDF]
Siqueira LP +7 more
europepmc +1 more source
DeOTA-IoT: A Techniques Catalog for Designing Over-the-Air (OTA) Update Systems for IoT. [PDF]
Villegas MM +3 more
europepmc +1 more source
In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework. [PDF]
Dora JR, Hluchý L, Staňo M.
europepmc +1 more source
Related searches:
VE-CoAP: A constrained application layer protocol for IoT video transmission
Journal of Network and Computer Applications, 2021Abstract Regarding the advantages of video for communications, it is expected that video transmission becomes an inseparable part of most IoT solutions which raises numerous challenges especially over LLNs (Low Power Lossy Networks). Considering these challenges and video transmission requirements for IoT applications, utilizing a proper application ...
Arvin Ghotbou, Mohammad Khansari
openaire +3 more sources

