Results 211 to 220 of about 189,755 (274)
Zero Trust for NHIs Based on Robust Identity and Access Management for a Resilient IoT Future. [PDF]
Mthethwa S, Dlamini MT, Jembere E.
europepmc +1 more source
ABSTRACT Climate change poses serious threats to food security by affecting agricultural production processes in multiple ways. This study aims to analyze land management–based solution strategies that can be developed in response to this threat and presents a systematic and holistic framework through the relationship these strategies establish with ...
Nihal Genc, H. Ebru Colak
wiley +1 more source
The Application of Telemedicine in Surgery
This figure provides an overview of the content presented in this article. Telemedicine is integrated throughout the entire surgical workflow, with distinct applications across the preoperative, intraoperative, and postoperative phases. These applications are enabled by a suite of supporting technologies, while the associated implementation challenges ...
Yufan Yang +8 more
wiley +1 more source
Securing internet of things devices using a hybrid approach. [PDF]
Jenny RS +9 more
europepmc +1 more source
ABSTRACT The lack of a common variable for comparison has been a major obstacle to the development of Comparative Public Administration (CPA). State autonomy enables an integrative contextualization approach, allowing both the analysis of contextual individual country experiences and the generation of generalized comparable knowledge.
Wilson Wong
wiley +1 more source
Enhancement of cryptography algorithms for security of cloud-based IoT with machine learning models. [PDF]
Qasem MA +5 more
europepmc +1 more source
ABSTRACT In privacy protection of control systems, a trade‐off between control performance and privacy level is often pointed out. Our goal in this paper is to improve this trade‐off by shaping the frequency of noise added for privacy protection when the control objective is to track a reference signal, which is taken as a piece of information whose ...
Rintaro Watanabe +3 more
wiley +1 more source
On the Convergence of Internet of Things and Decentralized Finance: Security Challenges and Future Directions. [PDF]
Sarasijanayanan P +2 more
europepmc +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
TTEA: designing a quantum-ready and energy-conscious encryption model for secure IoT environments. [PDF]
Abdelaal MA +3 more
europepmc +1 more source

