Results 301 to 310 of about 517,878 (310)
Some of the next articles are maybe not open access.

RMDD: Cross Layer Attack in Internet of Things

2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018
The existing research on the Internet of Things(IoT) security mainly focuses on attack and defense on a single protocol layer. Increasing and ubiquitous use of loT also makes it vulnerable to many attacks. An attacker try to performs the intelligent, brutal and stealthy attack that can reduce the risk of being detected.
Shailesh Garg   +5 more
openaire   +2 more sources

Internet-Based Design Visualization for Layered Manufacturing

Concurrent Engineering, 2003
When considering the use of layered manufacturing (LM), there are many issues a designer has to address for handling a stereolithography tessellation language (STL) model, the de facto standard for LM. In this paper, we propose an Internet-based design visualization tool for decision support when optimizing the LM process in support of a highly ...
R. Ian Campbell, Haeseong Jee
openaire   +2 more sources

Internet transport layer system identification

Proceedings of the 11th IEEE Signal Processing Workshop on Statistical Signal Processing (Cat. No.01TH8563), 2002
This paper addresses the problem of building appropriate statistical models of the way the Internet appears from the point of view of congestion, to a transmission control protocol (TCP) sender. TCP is a mechanism for implementing full duplex, acknowledged, end-to-end transmission over an Internet protocol (IP) network.
openaire   +2 more sources

Wireless Physical-Layer Authentication for the Internet of Things

2017
Authentication of messages in an Internet of Things (IoT) is a key security feature that may involve heavy signaling and protocol procedures, not suitable for small devices with very limited computational capabilities and energy availability. In this chapter we address the problem of message authentication in an IoT context, by using physical-layer ...
CAPARRA, GIANLUCA   +4 more
openaire   +3 more sources

Redesigning Transport Layer Architecture for Future Internet

2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011
Current transport layer is facing challenges from both the original design drawbacks and new evolutionary technologies demands. The strict hierarchical layer architecture is restricted and inflexible, which makes the addition and deployment of new features difficult.
Feng Qiu   +5 more
openaire   +2 more sources

A Multi-layer Security Model for Internet of Things

2012
Since the open architecture at the perception layer, the IoT not only faces the traditional security risks in TCP/IP network, but also faces the new emerging risks. In this paper, through analysising the infrastructure of IoT and the security risks in IoT, a new multi-layer security model is proposed, which aims to improve the security technique in IoT.
Geng Zhenmin   +3 more
openaire   +2 more sources

The Internet Application Layer and the Cloud

2012
The applications in the Internet application layer are the face of the cloud. When an enterprise user records a sales contact in a SaaS customer relations management application, they use a browser. The browser interacts through the Web with a back-end application in a cloud.
openaire   +2 more sources

Internet layer protocols

2003
Deon Reynders, Edwin Wright
openaire   +1 more source

A Survey on Layered Approach for Internet of Things Security

Advanced Science and Technology Letters, 2017
Bonomali Khuntia, Santosh Kumar Sharma
openaire   +1 more source

Home - About - Disclaimer - Privacy