The security of IOT from the perspective of the observability of complex networks. [PDF]
Wu X, Jing Z, Wang X.
europepmc +1 more source
A comprehensive survey on securing the social internet of things: protocols, threat mitigation, technological integrations, tools, and performance metrics. [PDF]
Patil DA, G S.
europepmc +1 more source
A Secure and Lightweight Group Mobility Authentication Scheme for 6LoWPAN Networks. [PDF]
Ashrif FF +3 more
europepmc +1 more source
Large Language Model-Powered Protected Interface Evasion: Automated Discovery of Broken Access Control Vulnerabilities in Internet of Things Devices. [PDF]
Wang E +8 more
europepmc +1 more source
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification. [PDF]
Hao J, Jin M, Li Y, Yang Y.
europepmc +1 more source
IPv6 addressing strategy with improved secure duplicate address detection to overcome denial of service and reconnaissance attacks. [PDF]
Kumar G +4 more
europepmc +1 more source
Bases selection with pseudo-random functions in BB84 scheme. [PDF]
Dervisevic E, Voznak M, Mehic M.
europepmc +1 more source
Trust-Aware Causal Consistency Routing for Quantum Key Distribution Networks Against Malicious Nodes. [PDF]
Luo Y, Li Q.
europepmc +1 more source

