Results 101 to 110 of about 14,625 (213)

Chemistry by Mobile Phone (or how to justify more time at the bar)

open access: yes, 2005
By combining automatic environment monitoring with Java smartphones a system has been produced for the real-time monitoring of experiments whilst away from the lab.
Bedi, Bharat V.   +4 more
core  

On the security of the MQTT protocol

open access: yes, 2016
We present a security analysis for one of the most popular standards for the Internet of Things, namely the MQ Telemetry Transport (MQTT) protocol, based on a formal model of the protocol in a timed process algebra. We explain the modelling choices we made and give a review of the results of earlier work on the formal verification of the protocol model.
openaire   +1 more source

Implementing circularity measurements in industry 4.0-based manufacturing metrology using MQTT protocol and Open CV: A case study. [PDF]

open access: yesPLoS One, 2023
Saif Y   +10 more
europepmc   +1 more source

Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories

open access: yesIEEE Access
Amid the exponential rise of Internet of Things (IoT) devices, the Message Queue Telemetry Transport (MQTT) protocol has gained prominence due to its efficiency in facilitating device-cloud interactions. Yet, the surge in IoT device usage and MQTT’
Shams Ul Arfeen Laghari   +5 more
doaj   +1 more source

Internet of Things: Survey on Security and Privacy

open access: yes, 2017
The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or "things". While its purpose is to provide effective and efficient solutions, security of the devices and network is a challenging issue.
Mendez, Diego M.   +2 more
core   +1 more source

MQTT in Action: Building Reliable and Scalable Home Automation Systems

open access: yesSakarya University Journal of Computer and Information Sciences
This study presents the development and implementation of an MQTT-based home automation system, emphasizing its reliability, scalability, and efficiency.
Bilal Raslen, Maysaa Salama
doaj   +1 more source

A gap analysis of Internet-of-Things platforms

open access: yes, 2016
We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the ...
Mazhelis, Oleksiy   +3 more
core   +1 more source

Implementation of IoT-based STEM-Contextual learning with the MQTT protocol on the digital literacy skills of pre-service science teacher

open access: yesLUMAT
The Internet of Things (IoT) with the Message Queue Telemetry Transport (MQTT) protocol in learning processes is one of the learning innovations in the digital era which has a significant role in students' digital literacy skills.
Didik Setyawarno   +4 more
doaj   +1 more source

Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare

open access: yes, 2017
The history of humanhood has included competitive activities of many different forms. Sports have offered many benefits beyond that of entertainment. At the time of this article, there exists not a competitive ecosystem for cyber security beyond that of ...
Pharr, Jovonni L.
core  

Home - About - Disclaimer - Privacy