Results 41 to 50 of about 186,858 (181)

Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets

open access: yesJOIV: International Journal on Informatics Visualization
Machine learning and artificial intelligence are increasingly being utilized to automate identifying and defining security requirements (SR) and addressing diverse IoT security issues.
Aftab Alam Janisar   +4 more
doaj   +1 more source

Implementation of Sensing and Actuation Capabilities for IoT Devices Using oneM2M Platforms

open access: yesSensors, 2019
In this paper, we present an implementation work of sensing and actuation capabilities for IoT devices using the oneM2M standard-based platforms. We mainly focus on the heterogeneity of the hardware interfaces employed in IoT devices.
Jaeseok Yun   +3 more
doaj   +1 more source

Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System

open access: yesTechnologies, 2020
Recent growth in the Internet of Things (IoT) looks promising for realizing a smart environment of the future. However, concerns about the security of IoT devices are escalating as they are inherently constrained by limited resources, heterogeneity, and ...
Anthony Overmars   +1 more
doaj   +1 more source

Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey

open access: yesIEEE Access, 2020
Through three development routes of authentication, communication, and computing, the Internet of Things (IoT) has become a variety of innovative integrated solutions for specific applications.
Hui Wu   +3 more
doaj   +1 more source

A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems

open access: yesIEEE Access
The Internet of Things (IoT) emerged as a pervasive technology, facilitating the seamless interaction of devices, individuals, and services, enabling data exchange and task execution across various domains.
Mumin Adam   +3 more
doaj   +1 more source

Leaders’ Perspectives on IoT Security Risk Management Strategies in Surveyed Organizations Relative to IoTSRM2

open access: yesApplied Sciences, 2021
In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) security risk management strategies becomes of particular importance to IoT adopters.
Traian Mihai Popescu   +2 more
doaj   +1 more source

Internet of Things: Survey on Security and Privacy

open access: yes, 2017
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M.   +2 more
core   +1 more source

A maturity classification model for winter jujubes based on DSAF-ResNet

open access: yesnpj Science of Food
Accurate, non-destructive classification of winter jujube maturity is critical for quality control and intelligent harvesting. This study proposes a dual-stream attention-fused residual network (DSAF-ResNet) combining hyperspectral and GLCM-based texture
Yufei Song   +5 more
doaj   +1 more source

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey

open access: yesIEEE Access
The Internet of Things (IoT) has revolutionized various domains, enabling interconnected devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in IoT systems further enhances their capabilities and potential benefits ...
Mamoona Humayun   +5 more
doaj   +1 more source

On the Activity Privacy of Blockchain for IoT

open access: yes, 2019
Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices.
Dorri, Ali   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy