Results 151 to 160 of about 2,951 (197)
An enhanced whale optimization algorithm for task scheduling in edge computing environments. [PDF]
Han L, Zhu S, Zhao H, He Y.
europepmc +1 more source
Addressing the Security Gap in IoT: Towards an IoT Cyber Range. [PDF]
Nock O, Starkey J, Angelopoulos CM.
europepmc +1 more source
Entropy-Based Correlation Analysis for Privacy Risk Assessment in IoT Identity Ecosystem. [PDF]
Chang KC, Barber S.
europepmc +1 more source
Design of a Trustworthy Cloud-Native National Digital Health Information Infrastructure for Secure Data Management and Use. [PDF]
Zao JK +21 more
europepmc +1 more source
IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6). [PDF]
Jara AJ +4 more
europepmc +1 more source
IoT Privacy Risks Revealed. [PDF]
Chang KC, Niu H, Kim B, Barber S.
europepmc +1 more source
IMPLEMENTASI OPENVPN SERVER MENGGUNAKAN RED HAT ENTERPRISE LINUX PADA AMAZON WEB SERVICES
Ayman Human Sukma +3 more
openalex +2 more sources
Uji kkeamanan sistem komunikasi VoIP dengan pemanfaatan fasilitas entripsi pada openvpn
Ahmad Fauzi
openalex +1 more source

