Results 291 to 300 of about 418,049 (343)
Research on Intrusion Detection Method Based on Transformer and CNN-BiLSTM in Internet of Things. [PDF]
Zhang C, Li J, Wang N, Zhang D.
europepmc +1 more source
Advanced intrusion detection in internet of things using graph attention networks. [PDF]
Ahanger AS +3 more
europepmc +1 more source
SILF Dataset: Fault Dataset for Solar Insecticidal Lamp Internet of Things Node. [PDF]
Yang X, Zhang L, Shu L, Jing X, Zhang Z.
europepmc +1 more source
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things. [PDF]
Asaithambi S +5 more
europepmc +1 more source
Evaluating the Ease of Application Development for the Internet of Things
Pankesh Patel +3 more
openalex +1 more source
Special Issue: Digital Healthcare Leveraging Edge Computing and the Internet of Things. [PDF]
Celesti A +3 more
europepmc +1 more source
Factors Determining Acceptance of Internet of Things in Medical Education: Mixed Methods Study.
Alhumaid K +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The Internet of Things: A survey
Computer Networks, 2010This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, enhanced communication protocols (shared with the Next Generation Internet), and distributed ...
ATZORI, LUIGI, Iera A, Morabito G.
openaire +6 more sources

