Results 1 to 10 of about 189,755 (274)

Multi-Source Knowledge Reasoning for Data-Driven IoT Security [PDF]

open access: yesSensors, 2021
Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis.
Shuqin Zhang   +5 more
doaj   +2 more sources

IoT Security Configurability with Security-by-Contract [PDF]

open access: yesSensors, 2019
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions,
Alberto Giaretta 0001   +2 more
openaire   +5 more sources

A survey of edge computing-based designs for IoT security

open access: yesDigital Communications and Networks, 2020
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk.
Kewei Sha   +3 more
doaj   +3 more sources

A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems [PDF]

open access: yesScientific Reports, 2023
Security is an important field in the Internet of Things (IoT) systems. The IoT and security are topical domains. Because it was obtained 35,077 document results from the Scopus database.
Hind Meziane, Noura Ouerdi
doaj   +2 more sources

SECURING IOT WITH BLOCKCHAIN [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2021
Abstract. IoT is becoming ubiquitous in industry, homes, cities, literally in every aspect of our daily lives. Securing IoT-based systems is difficult because of deficiencies in the very nature of IoT devices such as limited battery power, processing, and storage, etc.
Dikilitaş, Yilmaz   +3 more
openaire   +4 more sources

Solutions for implementing security features for typical applications in SMART environments [PDF]

open access: yesRevista Română de Informatică și Automatică, 2021
The solutions on security functions for typical applications in Smart environments should be implemented by providers who manufacture IoT (Internet of Things) devices, by engineers designing IoT solutions, by researchers evaluating IoT systems and by ...
Mihail DUMITRACHE   +2 more
doaj   +1 more source

Landscape of IoT security

open access: yesComputer Science Review, 2022
The last two decades have experienced a steady rise in the production and deployment of sensing-and-connectivity-enabled electronic devices, replacing “regular” physical objects. The resulting Internet-of-Things (IoT) will soon become indispensable for many application domains.
Eryk Schiller   +5 more
openaire   +3 more sources

Efficient Output Feedback MPC for NCS With Data Dropout and Bounded Disturbance via Adaptive Event-Triggered Control

open access: yesIEEE Access, 2023
This paper studies efficient output feedback model predictive control (OFMPC) via adaptive event-triggered control (AETC) for the networked control system (NCS) with data dropout and bounded disturbance.
Minghong She, Wenbin Wu
doaj   +1 more source

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

IOT Future Security Challenges and Recent Solutions [PDF]

open access: yesJournal of Information Technology Management, 2022
Internet of Things could be current paradigm, with promising recent wireless communication. Simultaneously as its will likely deliver compelling and effective arrangement, security of the gadgets and organization could be challenge issue.
Khaled Mofawiz Alfawaz
doaj   +1 more source

Home - About - Disclaimer - Privacy