Results 11 to 20 of about 189,755 (274)

Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]

open access: yes, 2020
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid   +4 more
core   +1 more source

A Security Situation Awareness Approach for IoT Software Chain Based on Markov Game Model.

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2022
Since Internet of Things (IoT) has been widely used in our daily life nowadays, it is regarded as a promising and popular application of the Internet, and has attracted more and more attention.
Xudong Zhu, Honggao Deng
doaj   +1 more source

IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines

open access: yesIoT, 2021
This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT.
Kosuke Ito   +2 more
doaj   +1 more source

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks

open access: yesDigital Communications and Networks, 2021
The Extended Kalman Filter (EKF) has received abundant attention with the growing demands for robotic localization. The EKF algorithm is more realistic in non-linear systems, which has an autonomous white noise in both the system and the estimation model.
Inam Ullah   +3 more
doaj   +1 more source

Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets

open access: yesSensors, 2017
Road traffic anomaly denotes a road segment that is anomalous in terms of traffic flow of vehicles. Detecting road traffic anomalies from GPS (Global Position System) snippets data is becoming critical in urban computing since they often suggest underlying ...
Hongtao Wang   +4 more
doaj   +1 more source

Novel Quadruple Cross-Coupled Memory Cell Designs With Protection Against Single Event Upsets and Double-Node Upsets

open access: yesIEEE Access, 2019
This paper presents two novel quadruple cross-coupled memory cell designs, namely QCCM10T and QCCM12T, with protection against single event upsets (SEUs) and double-node upsets (DNUs).
Aibin Yan   +6 more
doaj   +1 more source

A Framework for Malicious Traffic Detection in IoT Healthcare Environment

open access: yesSensors, 2021
The Internet of things (IoT) has emerged as a topic of intense interest among the research and industrial community as it has had a revolutionary impact on human life.
Faisal Hussain   +7 more
doaj   +1 more source

Detecting stealthy attacks against industrial control systems based on residual skewness analysis

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has two sides.
Yan Hu   +5 more
doaj   +1 more source

A Review of Security Standards and Frameworks for IoT-Based Smart Environments

open access: yesIEEE Access, 2021
Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying ...
Nickson M. Karie   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy