Results 1 to 10 of about 186,838 (161)

Multi-Source Knowledge Reasoning for Data-Driven IoT Security [PDF]

open access: yesSensors, 2021
Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis.
Shuqin Zhang   +5 more
doaj   +2 more sources

A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems [PDF]

open access: yesScientific Reports, 2023
Security is an important field in the Internet of Things (IoT) systems. The IoT and security are topical domains. Because it was obtained 35,077 document results from the Scopus database.
Hind Meziane, Noura Ouerdi
doaj   +2 more sources

IoT Security Configurability with Security-by-Contract. [PDF]

open access: yesSensors (Basel), 2019
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions,
Giaretta A, Dragoni N, Massacci F.
europepmc   +6 more sources

Solutions for implementing security features for typical applications in SMART environments [PDF]

open access: yesRevista Română de Informatică și Automatică, 2021
The solutions on security functions for typical applications in Smart environments should be implemented by providers who manufacture IoT (Internet of Things) devices, by engineers designing IoT solutions, by researchers evaluating IoT systems and by ...
Mihail DUMITRACHE   +2 more
doaj   +1 more source

Efficient Output Feedback MPC for NCS With Data Dropout and Bounded Disturbance via Adaptive Event-Triggered Control

open access: yesIEEE Access, 2023
This paper studies efficient output feedback model predictive control (OFMPC) via adaptive event-triggered control (AETC) for the networked control system (NCS) with data dropout and bounded disturbance.
Minghong She, Wenbin Wu
doaj   +1 more source

SECURING IOT WITH BLOCKCHAIN [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2021
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc.
Dikilitaş, Yilmaz   +3 more
openaire   +4 more sources

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]

open access: yes, 2020
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid   +4 more
core   +1 more source

IOT Future Security Challenges and Recent Solutions [PDF]

open access: yesJournal of Information Technology Management, 2022
Internet of Things could be current paradigm, with promising recent wireless communication. Simultaneously as its will likely deliver compelling and effective arrangement, security of the gadgets and organization could be challenge issue.
Khaled Mofawiz Alfawaz
doaj   +1 more source

Home - About - Disclaimer - Privacy