Auswahl der wissenschaftlichen Literatur zum Thema „Conventional security on future things“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Conventional security on future things" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Conventional security on future things"
U. Harita, Ms, und K. V.DayaSagar. „A survey on secured internet of things architecture“. International Journal of Engineering & Technology 7, Nr. 2.7 (18.03.2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.
Der volle Inhalt der QuelleAlshehri, Mohammed. „Blockchain-assisted cyber security in medical things using artificial intelligence“. Electronic Research Archive 31, Nr. 2 (2022): 708–28. http://dx.doi.org/10.3934/era.2023035.
Der volle Inhalt der QuellePatil, Shamshekhar S., und Arun Biradar. „Novel authentication framework for securing communication in internet-of-things“. International Journal of Electrical and Computer Engineering (IJECE) 10, Nr. 1 (01.02.2020): 1092. http://dx.doi.org/10.11591/ijece.v10i1.pp1092-1100.
Der volle Inhalt der QuelleQiu, Xiaoying, Jinwei Yu, Wenying Zhuang, Guangda Li und Xuan Sun. „Channel Prediction-Based Security Authentication for Artificial Intelligence of Things“. Sensors 23, Nr. 15 (27.07.2023): 6711. http://dx.doi.org/10.3390/s23156711.
Der volle Inhalt der QuelleQasim, Hiba Adnan, und Rana Saad Mohammed. „Lightweight Steganography Technique in The Internet of Things: A survey“. Al-Salam Journal for Engineering and Technology 3, Nr. 1 (18.11.2023): 97–108. http://dx.doi.org/10.55145/ajest.2024.03.01.008.
Der volle Inhalt der QuelleDu, Qinghe, Ying Xu, Wanyu Li und Houbing Song. „Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes“. Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8404219.
Der volle Inhalt der QuelleS.P. Revathy, N. MadhiVathani, NaafiahFathima und A. MohammedIlyas. „Prediction and Prevention of Theft in Jewellery Shop“. IRO Journal on Sustainable Wireless Systems 5, Nr. 3 (September 2023): 194–206. http://dx.doi.org/10.36548/jsws.2023.3.002.
Der volle Inhalt der QuelleArora, Priyanka, und Ritu Makani. „Blockchain Integration with AIoT Data Security and Privacy for Sustainability“. Journal of Artificial Intelligence and Systems 6, Nr. 1 (2024): 112–23. http://dx.doi.org/10.33969/ais.2024060108.
Der volle Inhalt der QuelleB Kolhapuri, Sammed, Sanket V Shenvi, Sheetal R Kulkarni und Ambika Naik Y. „Survey Paper on “IoT-Driven Aquaponics for Sustainable Agriculture”“. IRO Journal on Sustainable Wireless Systems 6, Nr. 1 (März 2024): 28–47. http://dx.doi.org/10.36548/jsws.2024.1.003.
Der volle Inhalt der QuelleTok, Yen Xin, Norliza Katuk und Ahmad Suki Che Mohamed Arif. „Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone“. International Journal of Interactive Mobile Technologies (iJIM) 15, Nr. 24 (21.12.2021): 32–48. http://dx.doi.org/10.3991/ijim.v15i24.25393.
Der volle Inhalt der QuelleDissertationen zum Thema "Conventional security on future things"
Kao, Wiyao. „Le contrat portant sur une chose future : essai d’une théorie générale“. Electronic Thesis or Diss., Poitiers, 2020. http://www.theses.fr/2020POIT3015.
Der volle Inhalt der QuelleThe expression "contract relating to a future thing" means that the contracting parties may validly stipulate that the thing due will be future; they may thus contract on a tangible or intangible thing that does not yet exist, at least in its entirety. Since the Roman sale of a future thing, contracts relating to a future thing have diversified. The practice of these contracts has become commonplace because of their economic importance. Taking the measure of this diversity and richness, reflection on the contract for a future thing has been considered under the heading of general theory. Contracts relating to a future thing are familiar figures without necessarily being noticed. It was necessary to identify them first of all. What characterizes them, and what is quickly apparent, is that each of these contracts presupposes a future thing which constitutes their object; this study proposes a clear and distinct definition of them. What is perhaps less obvious from an analysis of these contracts, and yet characteristic of them, is that they are always commutative contracts and not random contracts. This feature shows that the Roman theory of the sale of a future thing, as it has always been presented, must be used today with great care to explain the whole mechanism of the contract for a future thing. The identification of the contract relating to a future thing continued with a reference to anticipation. This is a doctrinal explanation of former article 1130, paragraph 1, of the Civil Code, which provided: "The subject-matter of an obligation may be a future thing". It explains even today, after the reform of the law of contract, the new article 1163, paragraph 1. These three references or criteria (the future thing, the absence of contingency and anticipation) have made it possible to identify, on the one hand, special contracts relating to a future thing and, on the other hand, contractual securities relating to a future thing. Once the various contracts relating to a future thing had been identified, it was important to study their legal regime in a second stage. A contract relating to a future thing is distinguished by two common and specific rules: first, the debtor is under a prior obligation to do something which consists in making the promised thing happen by participating in its creation or by executing another contract; and second, the creditor has a possible right, which is the pure and simple right in germ, in favour of the creditor. Moreover, most of the developments on the validity and non-performance of a contract relating to a future thing fall under the general law of contract. The problems discussed did not make it possible to identify any specific features relating to the aspect of the future thing, the object of the service.In terms of the concept and the regime, there are a total of five common criteria and rules on which to base a general theory of the contract relating to a thing in the future
Aqeel, Muhammad. „Internet of Things : Systematic literature review of security and future research“. Thesis, Uppsala universitet, Informationssystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420118.
Der volle Inhalt der QuelleBude, Cristian, und Bergstrand Andreas Kervefors. „Internet of Things : Exploring and Securing a Future Concept“. Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.
Der volle Inhalt der QuelleInternet of Things (IoT) är ett koncept som omfattar olika objekt och kommunikationsmetoder för utbyte av information. Idag är IoT mer en beskrivande term av den framtidsvision som finns att allting ska vara uppkopplat på internet. IoT kommer vara fundamentalt i framtiden eftersom konceptet öppnar upp möjligheter för nya tjänster samt nya innovationer. Då alla objekt ska vara uppkopplade och kunna kommunicera med varandra samtidigt som de skall kunna operera i oskyddade miljöer, bidrar detta till stora säkerhetsutmaningar. Dagens IoT är i stort behov av standardisering och klara strukturer för hur tekniken ska implementeras samt samverka med varandra på ett säkert sätt. Utmaningarna ligger i att säkra tekniken samt informationen som tekinken bidrar med. Denna rapport ger en introduktion till vad IoT är och hur det kan användas samt vilka hot som IoT kan möta i avseende till informationssäkerhet. Utöver detta så förser rapporten läsaren med förslag om hur man eventuellt kan lösa de fundamentala behoven av autentisering och säker kommunikation. Lösningarna som läggs fram är baserade på både nutida lösningar och teknik som är under utveckling inför framtiden. Nutida lösningar är baserade på säkerhetsprotokoll som IPsec och DTLS som används i en miljö som sträcker över internet och in i ett 6LoWPAN nätverk. Den autentiseringslösning som tagits fram grundar sig på PKI och förtroendemodeller för certifikathantering. För framtida arbete presenteras flertalet vidare fördjupningsområden där denna rapport kan användas som grund. Dessa fördjupningsområden inkluderar vidare analys av sårbarheter och implementation av de lösningar som tagits fram.
DUSHKU, EDLIRA. „Remote attestation to ensure the security of future Internet of Things services“. Doctoral thesis, 2020. http://hdl.handle.net/11573/1382715.
Der volle Inhalt der QuelleBücher zum Thema "Conventional security on future things"
Sloan, Stanley R. Conventional arms control and Europe's future. New York, N.Y: Foreign Policy Association, 1989.
Den vollen Inhalt der Quelle findenA, Millen Raymond, und Army War College (U.S.). Strategic Studies Institute., Hrsg. Future war, future battlespace: The strategic role of American landpower. [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2003.
Den vollen Inhalt der Quelle findenBonen, Zeev. Advanced technology and future warfare. Ramat Gan, Israel: BESA Center, Bar-Ilan University, 1996.
Den vollen Inhalt der Quelle findenUnited States. Government Accountability Office. Operation Iraqi Freedom: DOD should apply lessons learned concerning the need for security over conventional munitions storage sites to future operations planning : report to congressional committees. [Washington, D.C.]: United States Government Accountability Office, 2007.
Den vollen Inhalt der Quelle findenGrauer, Ryan. Conventional Interstate Warfare. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0027.
Der volle Inhalt der QuelleNatalie, Klein. 26 Maritime Security. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198715481.003.0026.
Der volle Inhalt der QuelleWong, Wilson W. S. Emerging Military Technologies. ABC-CLIO, LLC, 2013. http://dx.doi.org/10.5040/9798400645068.
Der volle Inhalt der QuelleClark, Robert, Raimond Maurer und Olivia S. Mitchell. How Persistent Low Returns Will Shape Saving and Retirement. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198827443.003.0001.
Der volle Inhalt der QuelleSatpathy, Suneeta, Sachi Nandan Mohanty, Tanupriya Choudhury, Subhendu Kumar Pani und Bhagirathi Nayak. Wireless Sensor Networks and the Internet of Things: Future Directions and Applications. Apple Academic Press, Incorporated, 2021.
Den vollen Inhalt der Quelle findenSatpathy, Suneeta, Sachi Nandan Mohanty, Tanupriya Choudhury, Subhendu Kumar Pani und Bhagirathi Nayak. Wireless Sensor Networks and the Internet of Things: Future Directions and Applications. Apple Academic Press, Incorporated, 2021.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Conventional security on future things"
Maheshwary, Priti, und Timothy Malche. „Safeguarding the Connected Future: Security in Internet of Things (IoT)“. In Internet of Things Security, 55–86. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338642-4.
Der volle Inhalt der QuelleMinh, Quang Tran, Phat Nguyen Huu, Takeshi Tsuchiya und Michel Toulouse. „Openness in Fog Computing for the Internet of Things“. In Future Data and Security Engineering, 343–57. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_23.
Der volle Inhalt der QuelleAgarwal, Puja, Anjana Mishra und Brojo Kishore Mishra. „The Future Security Solution to the Internet of Things: Biometric Technology“. In Internet of Things, 163–74. New York: Apple Academic Press, 2023. http://dx.doi.org/10.1201/9781003304609-9.
Der volle Inhalt der QuelleArévalo, Rodrigo Alexander Fagua, Octavio José Salcedo Parra und Juan Manuel Sánchez Céspedes. „Security for the Internet of Things and the Bluetooth Protocol“. In Future Data and Security Engineering, 74–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03192-3_7.
Der volle Inhalt der QuelleHamad, Salma Abdalla, Quan Z. Sheng und Wei Emma Zhang. „Conclusion and Future Directions“. In Security Framework for The Internet of Things Applications, 102–8. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003478683-6.
Der volle Inhalt der QuelleTôn, Long-Phuoc, Lam-Son Lê und Hoang-Anh Pham. „Towards a Domain Specific Framework for Wearable Applications in Internet of Things“. In Future Data and Security Engineering, 309–24. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70004-5_22.
Der volle Inhalt der QuelleQureshi, Kashif Naseer, Thomas Newe, Rosheen Qazi und Gwanggil Jeon. „Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends“. In Internet of Things, 291–306. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33808-3_16.
Der volle Inhalt der QuelleSrivastava, Gautam, Reza M. Parizi und Ali Dehghantanha. „The Future of Blockchain Technology in Healthcare Internet of Things Security“. In Advances in Information Security, 161–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3_9.
Der volle Inhalt der QuelleTan, Soo Fun, Azman Samsudin und Suraya Alias. „Internet of Things: Security Challenges and Its Future Direction“. In 10th International Conference on Robotics, Vision, Signal Processing and Power Applications, 483–88. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6447-1_61.
Der volle Inhalt der QuelleAbed, Amira Hassan, Mona Nasr und Basant Sayed. „The Principle Internet of Things (IoT) Security Techniques Framework Based on Seven Levels IoT’s Reference Model“. In Internet of Things—Applications and Future, 219–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3075-3_15.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Conventional security on future things"
Leventi-peetz, Anastasia-maria. „Human Machine Interaction and Security in the era of modern Machine Learning“. In 9th International Conference on Human Interaction and Emerging Technologies - Artificial Intelligence and Future Applications. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002963.
Der volle Inhalt der QuelleSodré, Y., J. Chatten und M. Liddell. „The Revolution in Marine Geo-Data Acquisition. What Does This Mean for a Future Workforce?“ In Offshore Technology Conference Brasil. OTC, 2023. http://dx.doi.org/10.4043/32963-ms.
Der volle Inhalt der QuelleKreider, Jan F., und Peter S. Curtiss. „Comprehensive Evaluation of Impacts From Potential, Future Automotive Fuel Replacements“. In ASME 2007 Energy Sustainability Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/es2007-36234.
Der volle Inhalt der QuelleHansen, Samuel, und Amin Mirkouei. „Past Infrastructures and Future Machine Intelligence (MI) for Biofuel Production: A Review and MI-Based Framework“. In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-86150.
Der volle Inhalt der QuelleGhorbel, Roukaya, Jamel Chakchak, Hatice Basmacıoğlu Malayoğlu und Numan S. Çetin. „Hydroponics “Soilless Farming”: The Future of Food and Agriculture – A Review“. In International Students Science Congress. Izmir International Guest Student Association, 2021. http://dx.doi.org/10.52460/issc.2021.007.
Der volle Inhalt der QuelleBiermann, Hannah, Gian Luca Liehner, Ralf Philipsen und Martina Ziefle. „Autonomous shuttle or conventional cab? Investigating users’ decision to share a ride“. In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003795.
Der volle Inhalt der QuelleLencsés, Enikő, und Kornélia Mészáros. „Challenges of Industry 4.0 in Hungarian agriculture“. In The European Union’s Contention in the Reshaping Global Economy. Szeged: Szegedi Tudományegyetem Gazdaságtudományi Kar, 2022. http://dx.doi.org/10.14232/eucrge.2022.16.
Der volle Inhalt der QuelleArora, Aman, Anureet Kaur, Bharat Bhushan und Himanshu Saini. „Security Concerns and Future Trends of Internet of Things“. In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). IEEE, 2019. http://dx.doi.org/10.1109/icicict46008.2019.8993222.
Der volle Inhalt der QuelleRathnayaka, L. S. D., B. K. M. Nadeetharu und U. Kulatunga. „Quantity surveyor’s perspective on document management in construction projects: an exploratory study in Sri Lanka“. In World Construction Symposium - 2023. Ceylon Institute of Builders - Sri Lanka, 2023. http://dx.doi.org/10.31705/wcs.2023.73.
Der volle Inhalt der QuelleObakhena, O. F., T. G. Biambo, J. Alli-Oluwafuyi und C. Ikiliagwu. „Alpha-28 FastTrack Maturation to Execution – Securing Export Gas Supply“. In SPE Nigeria Annual International Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/217168-ms.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Conventional security on future things"
Tissot, Roger. Latin America's Energy Future. Inter-American Development Bank, Dezember 2012. http://dx.doi.org/10.18235/0006946.
Der volle Inhalt der QuelleDavies, Will. Improving the engagement of UK armed forces overseas. Royal Institute of International Affairs, Januar 2022. http://dx.doi.org/10.55317/9781784135010.
Der volle Inhalt der QuelleOssoff, Will, Naz Modirzadeh und Dustin Lewis. Preparing for a Twenty-Four-Month Sprint: A Primer for Prospective and New Elected Members of the United Nations Security Council. Harvard Law School Program on International Law and Armed Conflict, Dezember 2020. http://dx.doi.org/10.54813/tzle1195.
Der volle Inhalt der Quelle