Results 11 to 20 of about 186,858 (181)
A Security Situation Awareness Approach for IoT Software Chain Based on Markov Game Model.
Since Internet of Things (IoT) has been widely used in our daily life nowadays, it is regarded as a promising and popular application of the Internet, and has attracted more and more attention.
Xudong Zhu, Honggao Deng
doaj +1 more source
An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers.
Liyanage, Madhusanka +3 more
+7 more sources
Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks
The Extended Kalman Filter (EKF) has received abundant attention with the growing demands for robotic localization. The EKF algorithm is more realistic in non-linear systems, which has an autonomous white noise in both the system and the estimation model.
Inam Ullah +3 more
doaj +1 more source
IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines
This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT.
Kosuke Ito +2 more
doaj +1 more source
Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets
Road traffic anomaly denotes a road segment that is anomalous in terms of traffic flow of vehicles. Detecting road traffic anomalies from GPS (Global Position System) snippets data is becoming critical in urban computing since they often suggest underlying ...
Hongtao Wang +4 more
doaj +1 more source
A survey of edge computing-based designs for IoT security
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk.
Kewei Sha +3 more
doaj +1 more source
This paper presents two novel quadruple cross-coupled memory cell designs, namely QCCM10T and QCCM12T, with protection against single event upsets (SEUs) and double-node upsets (DNUs).
Aibin Yan +6 more
doaj +1 more source
A Framework for Malicious Traffic Detection in IoT Healthcare Environment
The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life.
Faisal Hussain +7 more
doaj +1 more source
Detecting stealthy attacks against industrial control systems based on residual skewness analysis
With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides.
Yan Hu +5 more
doaj +1 more source
A Review of Security Standards and Frameworks for IoT-Based Smart Environments
Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying ...
Nickson M. Karie +4 more
doaj +1 more source

