Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid +4 more
core +1 more source
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan +2 more
core +3 more sources
Adaptive Intelligent Super-Twisting Control of Dynamic System
This study develops an adaptive Super-Twisting sliding mode control (STSMC) approach using an output feedback fuzzy neural network (OFFNN) for dynamic systems.
Qi Pan, Juntao Fei, Yuncan Xue
doaj +1 more source
Anomaly Detection and Classification in Predictive Maintenance Tasks with Zero Initial Training
The Fourth Industrial Revolution has led to the adoption of novel technologies and methodologies in factories, making these more efficient and productive.
Filippo Morselli +4 more
doaj +1 more source
Enabling IoT ecosystems through platform interoperability [PDF]
Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models.
Anicic, Darko +9 more
core +2 more sources
Evaluation and Selection Models for Ensemble Intrusion Detection Systems in IoT
Using the Internet of Things (IoT) for various applications, such as home and wearables devices, network applications, and even self-driven vehicles, detecting abnormal traffic is one of the problematic areas for researchers to protect network ...
Rubayyi Alghamdi, Martine Bellaiche
doaj +1 more source
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna +9 more
core +3 more sources
Tinier-YOLO: A Real-Time Object Detection Method for Constrained Environments
Deep neural networks (DNNs) have shown prominent performance in the field of object detection. However, DNNs usually run on powerful devices with high computational ability and sufficient memory, which have greatly limited their deployment for ...
Wei Fang, Lin Wang, Peiming Ren
doaj +1 more source
An Improved Cooperative Control Method for Hybrid Unmanned Aerial-Ground System in Multitasks
The cooperative control in complex multitasks using unmanned aerial vehicle and unmanned ground vehicle (UAV/UGV) is an important and challenging issue in the multirobot cooperative field.
Jianjun Ni +3 more
doaj +1 more source
Support vector regression (SVR) is one of the most powerful and widely used machine learning algorithms regarding prediction. The kernel type, penalty factor and other parameters influence the efficiency and performance of SVR deeply. The optimization of
Weidong Cao, Xin Liu, Jianjun Ni
doaj +1 more source

