Showing 781 - 800 results of 1,444 for search '"Internet of things"', query time: 0.06s Refine Results
  1. 781
  2. 782
  3. 783

    Exploring the vulnerability in the inference phase of advanced persistent threats by Qi Wu, Qiang Li, Dong Guo, Xiangyu Meng

    Published 2022-03-01
    “…In recent years, the Internet of Things has been widely used in modern life. …”
    Get full text
    Article
  4. 784

    Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches by Mahmood Al-Bahri, Wasin Alkishri, Falah Y. H. Ahmed, Marwan Alshar'e, Sanad Al Maskari

    Published 2024-03-01
    “… The Internet of Things (IoT) encompasses a network of different devices, both stationary and mobile, that may interact with the physical world. …”
    Get full text
    Article
  5. 785
  6. 786

    Detection and identification technology of rotor unmanned aerial vehicles in 5G scene by Fengtong Xu, Tao Hong, Jingcheng Zhao, Tao Yang

    Published 2019-06-01
    “…In the 5G era, integration between different networks is required to realize a new world of Internet of things, the most typical model is Space–Air–Ground Internet of things. …”
    Get full text
    Article
  7. 787

    Research on the NB-IoT Random Access in LEO Satellite IoT by Haodong LIU, Zhong ZHENG, Wenjin WANG, Li YOU, Xiqi GAO

    Published 2021-12-01
    “…Narrowband internet of things (NB-IoT) technology is widely used in data communications for a large number of low-speed and low-power devices, but it is diff cult to provide services for remote areas that cannot be covered by terrestrial networks.With its global coverage and low cost, the LEO satellite constellation can supplement and expand the terrestrial NB-IoT infrastructure, providing an eff ective solution for the space-based internet of things.Facing the application requirements of space-based internet of things, on the basis of reviewing the NB-IoT system architecture, the challenges of channel environment high dynamic delay and frequency off set faced by the application of NB-IoT technology in the LEO satellite constellation scenario were analyzed.For the uplink random access process, an eff ective user detection and timing synchronization method was designed, which had the advantages of high performance and low complexity, and provided an eff cient receiving method for the LEO satellite NB-IoT uplink random access synchronization.…”
    Get full text
    Article
  8. 788
  9. 789
  10. 790
  11. 791
  12. 792

    APT attack threat-hunting network model based on hypergraph Transformer by Yuancheng LI, Yukun LIN

    Published 2024-02-01
    “…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
    Get full text
    Article
  13. 793

    eDAAAS: Efficient distributed anonymous authentication and access in smart homes by An Braeken, Pawani Porambage, Milos Stojmenovic, Lambros Lambrinos

    Published 2016-12-01
    “…The proposed scheme ensures that even if the stakeholder’s device or the Internet of Things device is attacked, the system remains secure.…”
    Get full text
    Article
  14. 794

    Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy by Amelia Dwi Rochani, Ari Kusyanti, Fariz Andri Bakhtiar

    Published 2022-12-01
    “… Kondisi Internet of Things saat ini yang cenderung tanpa menggunakan fitur keamanan dapat menjadi tantangan untuk realisasi Internet of things terutama di bidang privasi dan kerahasiaan data, khususnya pada modul sensorik berdaya rendah yaitu Bluetooth Low Energy. …”
    Get full text
    Article
  15. 795
  16. 796

    IoT in Urban Traffic Prediction Development Case Studies and Future Trends by Wang Renhe

    Published 2025-01-01
    “…This paper first briefly summarizes the development process of using the Internet of Things (IoT) to calculate future road traffic. …”
    Get full text
    Article
  17. 797
  18. 798

    Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version by M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, Mathiyalagan Palaniappan

    Published 2015-01-01
    “…The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. …”
    Get full text
    Article
  19. 799

    Secret sharing-based authentication and key agreement protocol for machine-type communications by Ana Paula G Lopes, Lucas O Hilgert, Paulo RL Gondim, Jaime Lloret

    Published 2019-04-01
    “…One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered one of the main foundations for the continued growth of Internet of Things connectivity and an important issue to be treated in the development of 5G networks. …”
    Get full text
    Article
  20. 800

    An IoT and Machine Learning-Based Model to Monitor Perishable Food towards Improving Food Safety and Quality by Amina Batool, Souvik Ganguli, Hashem Ali Almashaqbeh, Muhammad Shafiq, A. L. Vallikannu, K. Sakthidasan Sankaran, Samrat Ray, F. Sammy

    Published 2022-01-01
    “…This article describes a technique for monitoring perishable goods that is based on the Internet of Things and machine learning. Pictures are recorded using high-resolution cameras in this suggested architecture, and then these images are sent to a cloud server using Internet of Things devices. …”
    Get full text
    Article