Results 31 to 40 of about 84,714 (295)
The rapid development of the Internet of Things (IoT), big data and artificial intelligence (AI) technology has brought extensive IoT services to entities. However, most IoT services carry the risk of leaking privacy.
Bai Liu +4 more
doaj +1 more source
ARCADIS: Asynchronous Remote Control-Flow Attestation of Distributed IoT Services
Remote attestation (RA) is a security mechanism that verifies the trustworthiness of remote IoT devices. Traditional RA protocols aim to detect the presence of malicious code in the static memory of a device.
Ragnar Mikael Halldorsson +2 more
doaj +1 more source
EC-CENTRIC: An Energy- and Context-Centric Perspective on IoT Systems and Protocol Design [PDF]
The radio transceiver of an IoT device is often where most of the energy is consumed. For this reason, most research so far has focused on low power circuit and energy efficient physical layer designs, with the goal of reducing the average energy per ...
Biason, Alessandro +6 more
core +1 more source
A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily ...
Hichem Mrabet +3 more
doaj +1 more source
DESIGN AND IMPLEMENT AN INTEROPERABLE INTERNET OF THINGS APPLICATION BASED ON AN EXTENDED OGC SENSORTHINGS API STANDARD [PDF]
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people’s ...
C. Y. Huang, C. H. Wu
doaj +1 more source
©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Alonso Zárate, Jesús +4 more
core +2 more sources
Middleware Technologies for Cloud of Things - a survey [PDF]
The next wave of communication and applications rely on the new services provided by Internet of Things which is becoming an important aspect in human and machines future.
Farahbakhsh, Reza +3 more
core +5 more sources
A Systematic Review on the Data Interoperability of Application Layer Protocols in Industrial IoT
Due to the rising popularity of the Internet of Things (IoT), interconnected infrastructures with better flexibility and efficiency are being developed for industry 4.0.
Anam Amjad +3 more
doaj +1 more source
PUF Based Authentication Protocol for IoT [PDF]
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other is an essential feature to provide in order to establish trust among its users. Physical Unclonable Functions (PUFs) on a device represent a low cost primitive exploiting the unique random patterns in the device and have been already applied in a ...
openaire +2 more sources
Analysis of breast region segmentation in thermal images using U-Net deep neural network variants
IntroductionBreast cancer detection using thermal imaging relies on accurate segmentation of the breast region from adjacent body areas. Reliable segmentation is essential to improve the effectiveness of computer-aided diagnosis systems.MethodsThis study
Rafhanah Shazwani Rosli +3 more
doaj +1 more source

