Zeitschriftenartikel zum Thema „Conventional security on future things“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Conventional security on future things" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
U. Harita, Ms, und K. V.DayaSagar. „A survey on secured internet of things architecture“. International Journal of Engineering & Technology 7, Nr. 2.7 (18.03.2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.
Der volle Inhalt der QuelleAlshehri, Mohammed. „Blockchain-assisted cyber security in medical things using artificial intelligence“. Electronic Research Archive 31, Nr. 2 (2022): 708–28. http://dx.doi.org/10.3934/era.2023035.
Der volle Inhalt der QuellePatil, Shamshekhar S., und Arun Biradar. „Novel authentication framework for securing communication in internet-of-things“. International Journal of Electrical and Computer Engineering (IJECE) 10, Nr. 1 (01.02.2020): 1092. http://dx.doi.org/10.11591/ijece.v10i1.pp1092-1100.
Der volle Inhalt der QuelleQiu, Xiaoying, Jinwei Yu, Wenying Zhuang, Guangda Li und Xuan Sun. „Channel Prediction-Based Security Authentication for Artificial Intelligence of Things“. Sensors 23, Nr. 15 (27.07.2023): 6711. http://dx.doi.org/10.3390/s23156711.
Der volle Inhalt der QuelleQasim, Hiba Adnan, und Rana Saad Mohammed. „Lightweight Steganography Technique in The Internet of Things: A survey“. Al-Salam Journal for Engineering and Technology 3, Nr. 1 (18.11.2023): 97–108. http://dx.doi.org/10.55145/ajest.2024.03.01.008.
Der volle Inhalt der QuelleDu, Qinghe, Ying Xu, Wanyu Li und Houbing Song. „Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes“. Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8404219.
Der volle Inhalt der QuelleS.P. Revathy, N. MadhiVathani, NaafiahFathima und A. MohammedIlyas. „Prediction and Prevention of Theft in Jewellery Shop“. IRO Journal on Sustainable Wireless Systems 5, Nr. 3 (September 2023): 194–206. http://dx.doi.org/10.36548/jsws.2023.3.002.
Der volle Inhalt der QuelleArora, Priyanka, und Ritu Makani. „Blockchain Integration with AIoT Data Security and Privacy for Sustainability“. Journal of Artificial Intelligence and Systems 6, Nr. 1 (2024): 112–23. http://dx.doi.org/10.33969/ais.2024060108.
Der volle Inhalt der QuelleB Kolhapuri, Sammed, Sanket V Shenvi, Sheetal R Kulkarni und Ambika Naik Y. „Survey Paper on “IoT-Driven Aquaponics for Sustainable Agriculture”“. IRO Journal on Sustainable Wireless Systems 6, Nr. 1 (März 2024): 28–47. http://dx.doi.org/10.36548/jsws.2024.1.003.
Der volle Inhalt der QuelleTok, Yen Xin, Norliza Katuk und Ahmad Suki Che Mohamed Arif. „Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone“. International Journal of Interactive Mobile Technologies (iJIM) 15, Nr. 24 (21.12.2021): 32–48. http://dx.doi.org/10.3991/ijim.v15i24.25393.
Der volle Inhalt der QuellePrinsloo, Jaco, Saurabh Sinha und Basie von Solms. „A Review of Industry 4.0 Manufacturing Process Security Risks“. Applied Sciences 9, Nr. 23 (26.11.2019): 5105. http://dx.doi.org/10.3390/app9235105.
Der volle Inhalt der QuelleNiveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath und Magesh S. „Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform“. International Journal of e-Collaboration 17, Nr. 4 (Oktober 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.
Der volle Inhalt der QuelleMalik, Ahmad Kamran, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh und Mohammad A. Alqarni. „From Conventional to State-of-the-Art IoT Access Control Models“. Electronics 9, Nr. 10 (15.10.2020): 1693. http://dx.doi.org/10.3390/electronics9101693.
Der volle Inhalt der QuelleAlkatheiri, Mohammed Saeed, und Ahmed S. Alghamdi. „Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry“. Electronics 12, Nr. 8 (11.04.2023): 1801. http://dx.doi.org/10.3390/electronics12081801.
Der volle Inhalt der QuelleJimmy, FNU. „Cyber security Vulnerabilities and Remediation Through Cloud Security Tools“. Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, Nr. 1 (12.04.2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Der volle Inhalt der QuelleJimmy, Fnu. „Cyber security Vulnerabilities and Remediation Through Cloud Security Tools“. Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, Nr. 1 (12.04.2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Der volle Inhalt der QuelleChetan, Rajani, und Ramesh Shahabadkar. „A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT“. International Journal of Electrical and Computer Engineering (IJECE) 8, Nr. 4 (01.08.2018): 2319. http://dx.doi.org/10.11591/ijece.v8i4.pp2319-2326.
Der volle Inhalt der QuelleSingh, Satyanand, Joanna Rosak-Szyrocka und László Tamàndl. „Development, Service-Oriented Architecture, and Security of Blockchain Technology for Industry 4.0 IoT Application“. HighTech and Innovation Journal 4, Nr. 1 (01.03.2023): 134–56. http://dx.doi.org/10.28991/hij-2023-04-01-010.
Der volle Inhalt der QuelleKim, Jiyoon, Daniel Gerbi Duguma, Sangmin Lee, Bonam Kim, JaeDeok Lim und Ilsun You. „Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches“. Mobile Information Systems 2021 (13.09.2021): 1–18. http://dx.doi.org/10.1155/2021/7314508.
Der volle Inhalt der QuelleChaudhary, Sachi, Riya Kakkar, Nilesh Kumar Jadav, Anuja Nair, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal et al. „A Taxonomy on Smart Healthcare Technologies: Security Framework, Case Study, and Future Directions“. Journal of Sensors 2022 (05.07.2022): 1–30. http://dx.doi.org/10.1155/2022/1863838.
Der volle Inhalt der QuelleFalayi, Ayodeji, Qianlong Wang, Weixian Liao und Wei Yu. „Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology“. Future Internet 15, Nr. 5 (11.05.2023): 178. http://dx.doi.org/10.3390/fi15050178.
Der volle Inhalt der QuelleKazia, Esmeralda. „Machine learning for False Information Detection in Social Internet of Things“. Fusion: Practice and Applications 10, Nr. 1 (2023): 38–77. http://dx.doi.org/10.54216/fpa.100103.
Der volle Inhalt der QuelleSatamraju, Krishna Prasad, und Malarkodi B. „Proof of Concept of Scalable Integration of Internet of Things and Blockchain in Healthcare“. Sensors 20, Nr. 5 (03.03.2020): 1389. http://dx.doi.org/10.3390/s20051389.
Der volle Inhalt der Quelle., Pratibha. „Lora Based Advanced Multipurpose Security System“. International Journal for Research in Applied Science and Engineering Technology 12, Nr. 3 (31.03.2024): 207–14. http://dx.doi.org/10.22214/ijraset.2024.58604.
Der volle Inhalt der QuelleAit Allal, Abdelmoula, Loubna El Amrani, Abdelfatteh Haidine, Khalifa Mansouri und Mohamed Youssfi. „Implementation of 5G Communication Network for a Safe Operation of Autonomous and Conventional Ships“. International Journal of Engineering Research in Africa 51 (November 2020): 229–48. http://dx.doi.org/10.4028/www.scientific.net/jera.51.229.
Der volle Inhalt der QuelleAhmed, Iqrar, Heikki Karvonen, Timo Kumpuniemi und Marcos Katz. „Wireless Communications for the Hospital of the Future: Requirements, Challenges and Solutions“. International Journal of Wireless Information Networks 27, Nr. 1 (28.10.2019): 4–17. http://dx.doi.org/10.1007/s10776-019-00468-1.
Der volle Inhalt der QuelleBhujel, Sangam, und Yogachandran Rahulamathavan. „A Survey: Security, Transparency, and Scalability Issues of NFT’s and Its Marketplaces“. Sensors 22, Nr. 22 (15.11.2022): 8833. http://dx.doi.org/10.3390/s22228833.
Der volle Inhalt der QuelleKabashkin, Igor, und Vladimir Perekrestov. „Ecosystem of Aviation Maintenance: Transition from Aircraft Health Monitoring to Health Management Based on IoT and AI Synergy“. Applied Sciences 14, Nr. 11 (22.05.2024): 4394. http://dx.doi.org/10.3390/app14114394.
Der volle Inhalt der QuelleSantoso, Lukman, und Tri Wahyu Surya Lestari. „Konparasi Syarat Keabsahan “Sebab Yang Halal” Dalam Perjanjian Konvensional Dan Perjanjian Syariah“. Al-Istinbath : Jurnal Hukum Islam 2, Nr. 1 (31.07.2017): 1. http://dx.doi.org/10.29240/jhi.v2i1.152.
Der volle Inhalt der QuelleMarinov, Val R. „Embedded Flexible Hybrid Electronics for the Internet of Things“. International Symposium on Microelectronics 2015, Nr. 1 (01.10.2015): 000006–13. http://dx.doi.org/10.4071/isom-2015-tp12.
Der volle Inhalt der QuelleFarooqui, Yassir, und Swpanil M. Parikh. „Secure and Transparent Supply Chain Management using Blockchain and IoT“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 11s (07.10.2023): 01–12. http://dx.doi.org/10.17762/ijritcc.v11i11s.8064.
Der volle Inhalt der QuelleZheng, Ping, Tingting Jiang und Fachang Wang. „Research on Auxiliary Devices for English Teaching under Intelligent Internet of Things“. Mobile Information Systems 2022 (26.09.2022): 1–11. http://dx.doi.org/10.1155/2022/8031846.
Der volle Inhalt der QuelleAbdulghani, Hezam Akram, Niels Alexander Nijdam, Anastasija Collen und Dimitri Konstantas. „A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective“. Symmetry 11, Nr. 6 (10.06.2019): 774. http://dx.doi.org/10.3390/sym11060774.
Der volle Inhalt der QuelleLeng, Jiewu, Ziying Chen, Zhiqiang Huang, Xiaofeng Zhu, Hongye Su, Zisheng Lin und Ding Zhang. „Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions“. Machines 10, Nr. 10 (26.09.2022): 858. http://dx.doi.org/10.3390/machines10100858.
Der volle Inhalt der QuelleAsano, Mizuki, Takumi Miyoshi und Taku Yamazaki. „Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments“. Future Internet 16, Nr. 1 (31.12.2023): 17. http://dx.doi.org/10.3390/fi16010017.
Der volle Inhalt der QuelleLipps, Christoph, Annika Tjabben, Matthias Rüb, Jan Herbst, Sogo Pierre Sanon, Rekha Reddy, Yorman Munoz und Hans D. Schotten. „Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities“. European Conference on Cyber Warfare and Security 22, Nr. 1 (19.06.2023): 267–75. http://dx.doi.org/10.34190/eccws.22.1.1207.
Der volle Inhalt der QuelleRizwan, Ali, Dimitrios A. Karras, Jitendra Kumar, Manuel Sánchez-Chero, Marlon Martín Mogollón Taboada und Gilder Cieza Altamirano. „An Internet of Things (IoT) Based Block Chain Technology to Enhance the Quality of Supply Chain Management (SCM)“. Mathematical Problems in Engineering 2022 (21.07.2022): 1–12. http://dx.doi.org/10.1155/2022/9679050.
Der volle Inhalt der QuelleNicol, Rozenn, und Jean-Yves Monfort. „Acoustic research for telecoms: bridging the heritage to the future“. Acta Acustica 7 (2023): 64. http://dx.doi.org/10.1051/aacus/2023056.
Der volle Inhalt der QuelleAhad, Abdul, Mohammad Tahir, Muhammad Aman Sheikh, Kazi Istiaque Ahmed, Amna Mughees und Abdullah Numani. „Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review“. Sensors 20, Nr. 14 (21.07.2020): 4047. http://dx.doi.org/10.3390/s20144047.
Der volle Inhalt der QuelleAdebayo Olusegun Aderibigbe, Peter Efosa Ohenhen, Nwabueze Kelvin Nwaobia, Joachim Osheyor Gidiagba und Emmanuel Chigozie Ani. „ADVANCED SENSING TECHNIQUES IN ELECTRO-MECHANICAL SYSTEMS: SURVEYING THE RISE OF SMART SENSORS AND THEIR IMPLICATIONS FOR SYSTEM ROBUSTNESS“. Engineering Science & Technology Journal 4, Nr. 6 (03.12.2023): 323–40. http://dx.doi.org/10.51594/estj.v4i6.628.
Der volle Inhalt der QuellePrasad, S. Rajendra, und M. Gopichand Naik. „A Review on Wind Power Forecasting Models for improved Renewable Energy Integration“. International Conference on Information Science and Technology Innovation (ICoSTEC) 1, Nr. 1 (26.02.2022): 35–40. http://dx.doi.org/10.35842/icostec.v1i1.20.
Der volle Inhalt der QuelleTrifunović, Darko, und Zoran Bjelica. „Cyber War - Trends and Technologies“. National security and the future 21, Nr. 3 (01.03.2021): 65–94. http://dx.doi.org/10.37458/nstf.21.3.2.
Der volle Inhalt der QuelleAbdull Rashid, Nur Farahin, Asma' Abu-Samah, Aishah Mohd Noh, Noor Zaim Syafiq Azam, Nur Najihah Wahid, Chee Qin Chiang, Haider Alobaidy, Nor Fadzilah Abdullah, Sawal Abdul Hamid und Rosdiadee Nordin. „DEVELOPMENT OF SMART CAMPUS APPLICATIONS BASED ON WIRELESS TECHNOLOGIES USING OPEN-SOURCE PLATFORMS“. Jurnal Teknologi 84, Nr. 3 (31.03.2022): 173–84. http://dx.doi.org/10.11113/jurnalteknologi.v84.16732.
Der volle Inhalt der QuelleAbdull Rashid, Nur Farahin, Asma' Abu-Samah, Aishah Mohd Noh, Noor Zaim Syafiq Azam, Nur Najihah Wahid, Chee Qin Chiang, Haider Alobaidy, Nor Fadzilah Abdullah, Sawal Abdul Hamid und Rosdiadee Nordin. „DEVELOPMENT OF SMART CAMPUS APPLICATIONS BASED ON WIRELESS TECHNOLOGIES USING OPEN-SOURCE PLATFORMS“. Jurnal Teknologi 84, Nr. 3 (31.03.2022): 173–84. http://dx.doi.org/10.11113/jurnalteknologi.v84.16732.
Der volle Inhalt der QuelleWang, Jiazheng, Xiuhua Fu, Rongqun Peng und Michel Kadoch. „An Innovative Infrastructure Based on Shape-Adaptive RIS for Smart Industrial IoTs“. Electronics 11, Nr. 3 (27.01.2022): 391. http://dx.doi.org/10.3390/electronics11030391.
Der volle Inhalt der QuelleYang, Qian, Jiaming Zhang, Junjie Zhang, Cailing Sun, Shanyi Xie, Shangdong Liu und Yimu Ji. „Graph Transformer Network Incorporating Sparse Representation for Multivariate Time Series Anomaly Detection“. Electronics 13, Nr. 11 (23.05.2024): 2032. http://dx.doi.org/10.3390/electronics13112032.
Der volle Inhalt der QuelleBanerjee, Indrajit, Jared Robinson, Abhishek Kashyap, Poornasha Mohabeer und Brijesh Sathian. „COVID-19 and Artificial Intelligence: the pandemic pacifier“. Nepal Journal of Epidemiology 10, Nr. 4 (31.12.2020): 919–22. http://dx.doi.org/10.3126/nje.v10i4.33334.
Der volle Inhalt der QuelleKaczmarczyk, Barbara, und Karolina Lis. „Perception of the Transition to a Zero-Emission Economy in the Opinion of Polish and Foreign Students: A Comparative Analysis“. Energies 16, Nr. 18 (08.09.2023): 6486. http://dx.doi.org/10.3390/en16186486.
Der volle Inhalt der QuelleAcquah-Andoh, Elijah, Augustine Ifelebuegu und Stephen Theophilus. „Brexit and UK Energy Security: Perspectives from Unconventional Gas Investment and the Effects of Shale Gas on UK Energy Prices“. Energies 12, Nr. 4 (14.02.2019): 600. http://dx.doi.org/10.3390/en12040600.
Der volle Inhalt der QuelleMizin, V. „Outlines of Strategic Stability in Global Multipolar Competition“. International Trends / Mezhdunarodnye protsessy 18, Nr. 2 (2020): 141–68. http://dx.doi.org/10.17994/it.2020.18.2.61.8.
Der volle Inhalt der Quelle