Journal articles on the topic 'Conventional security on future things'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Conventional security on future things.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
U. Harita, Ms, and K. V.DayaSagar. "A survey on secured internet of things architecture." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.
Full textAlshehri, Mohammed. "Blockchain-assisted cyber security in medical things using artificial intelligence." Electronic Research Archive 31, no. 2 (2022): 708–28. http://dx.doi.org/10.3934/era.2023035.
Full textPatil, Shamshekhar S., and Arun Biradar. "Novel authentication framework for securing communication in internet-of-things." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 1092. http://dx.doi.org/10.11591/ijece.v10i1.pp1092-1100.
Full textQiu, Xiaoying, Jinwei Yu, Wenying Zhuang, Guangda Li, and Xuan Sun. "Channel Prediction-Based Security Authentication for Artificial Intelligence of Things." Sensors 23, no. 15 (July 27, 2023): 6711. http://dx.doi.org/10.3390/s23156711.
Full textQasim, Hiba Adnan, and Rana Saad Mohammed. "Lightweight Steganography Technique in The Internet of Things: A survey." Al-Salam Journal for Engineering and Technology 3, no. 1 (November 18, 2023): 97–108. http://dx.doi.org/10.55145/ajest.2024.03.01.008.
Full textDu, Qinghe, Ying Xu, Wanyu Li, and Houbing Song. "Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes." Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8404219.
Full textS.P. Revathy, N. MadhiVathani, NaafiahFathima, and A. MohammedIlyas. "Prediction and Prevention of Theft in Jewellery Shop." IRO Journal on Sustainable Wireless Systems 5, no. 3 (September 2023): 194–206. http://dx.doi.org/10.36548/jsws.2023.3.002.
Full textArora, Priyanka, and Ritu Makani. "Blockchain Integration with AIoT Data Security and Privacy for Sustainability." Journal of Artificial Intelligence and Systems 6, no. 1 (2024): 112–23. http://dx.doi.org/10.33969/ais.2024060108.
Full textB Kolhapuri, Sammed, Sanket V Shenvi, Sheetal R Kulkarni, and Ambika Naik Y. "Survey Paper on “IoT-Driven Aquaponics for Sustainable Agriculture”." IRO Journal on Sustainable Wireless Systems 6, no. 1 (March 2024): 28–47. http://dx.doi.org/10.36548/jsws.2024.1.003.
Full textTok, Yen Xin, Norliza Katuk, and Ahmad Suki Che Mohamed Arif. "Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 32–48. http://dx.doi.org/10.3991/ijim.v15i24.25393.
Full textPrinsloo, Jaco, Saurabh Sinha, and Basie von Solms. "A Review of Industry 4.0 Manufacturing Process Security Risks." Applied Sciences 9, no. 23 (November 26, 2019): 5105. http://dx.doi.org/10.3390/app9235105.
Full textNiveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (October 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.
Full textMalik, Ahmad Kamran, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, and Mohammad A. Alqarni. "From Conventional to State-of-the-Art IoT Access Control Models." Electronics 9, no. 10 (October 15, 2020): 1693. http://dx.doi.org/10.3390/electronics9101693.
Full textAlkatheiri, Mohammed Saeed, and Ahmed S. Alghamdi. "Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry." Electronics 12, no. 8 (April 11, 2023): 1801. http://dx.doi.org/10.3390/electronics12081801.
Full textJimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 12, 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Full textJimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (April 12, 2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Full textChetan, Rajani, and Ramesh Shahabadkar. "A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (August 1, 2018): 2319. http://dx.doi.org/10.11591/ijece.v8i4.pp2319-2326.
Full textSingh, Satyanand, Joanna Rosak-Szyrocka, and László Tamàndl. "Development, Service-Oriented Architecture, and Security of Blockchain Technology for Industry 4.0 IoT Application." HighTech and Innovation Journal 4, no. 1 (March 1, 2023): 134–56. http://dx.doi.org/10.28991/hij-2023-04-01-010.
Full textKim, Jiyoon, Daniel Gerbi Duguma, Sangmin Lee, Bonam Kim, JaeDeok Lim, and Ilsun You. "Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches." Mobile Information Systems 2021 (September 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/7314508.
Full textChaudhary, Sachi, Riya Kakkar, Nilesh Kumar Jadav, Anuja Nair, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal, et al. "A Taxonomy on Smart Healthcare Technologies: Security Framework, Case Study, and Future Directions." Journal of Sensors 2022 (July 5, 2022): 1–30. http://dx.doi.org/10.1155/2022/1863838.
Full textFalayi, Ayodeji, Qianlong Wang, Weixian Liao, and Wei Yu. "Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology." Future Internet 15, no. 5 (May 11, 2023): 178. http://dx.doi.org/10.3390/fi15050178.
Full textKazia, Esmeralda. "Machine learning for False Information Detection in Social Internet of Things." Fusion: Practice and Applications 10, no. 1 (2023): 38–77. http://dx.doi.org/10.54216/fpa.100103.
Full textSatamraju, Krishna Prasad, and Malarkodi B. "Proof of Concept of Scalable Integration of Internet of Things and Blockchain in Healthcare." Sensors 20, no. 5 (March 3, 2020): 1389. http://dx.doi.org/10.3390/s20051389.
Full text., Pratibha. "Lora Based Advanced Multipurpose Security System." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 207–14. http://dx.doi.org/10.22214/ijraset.2024.58604.
Full textAit Allal, Abdelmoula, Loubna El Amrani, Abdelfatteh Haidine, Khalifa Mansouri, and Mohamed Youssfi. "Implementation of 5G Communication Network for a Safe Operation of Autonomous and Conventional Ships." International Journal of Engineering Research in Africa 51 (November 2020): 229–48. http://dx.doi.org/10.4028/www.scientific.net/jera.51.229.
Full textAhmed, Iqrar, Heikki Karvonen, Timo Kumpuniemi, and Marcos Katz. "Wireless Communications for the Hospital of the Future: Requirements, Challenges and Solutions." International Journal of Wireless Information Networks 27, no. 1 (October 28, 2019): 4–17. http://dx.doi.org/10.1007/s10776-019-00468-1.
Full textBhujel, Sangam, and Yogachandran Rahulamathavan. "A Survey: Security, Transparency, and Scalability Issues of NFT’s and Its Marketplaces." Sensors 22, no. 22 (November 15, 2022): 8833. http://dx.doi.org/10.3390/s22228833.
Full textKabashkin, Igor, and Vladimir Perekrestov. "Ecosystem of Aviation Maintenance: Transition from Aircraft Health Monitoring to Health Management Based on IoT and AI Synergy." Applied Sciences 14, no. 11 (May 22, 2024): 4394. http://dx.doi.org/10.3390/app14114394.
Full textSantoso, Lukman, and Tri Wahyu Surya Lestari. "Konparasi Syarat Keabsahan “Sebab Yang Halal” Dalam Perjanjian Konvensional Dan Perjanjian Syariah." Al-Istinbath : Jurnal Hukum Islam 2, no. 1 (July 31, 2017): 1. http://dx.doi.org/10.29240/jhi.v2i1.152.
Full textMarinov, Val R. "Embedded Flexible Hybrid Electronics for the Internet of Things." International Symposium on Microelectronics 2015, no. 1 (October 1, 2015): 000006–13. http://dx.doi.org/10.4071/isom-2015-tp12.
Full textFarooqui, Yassir, and Swpanil M. Parikh. "Secure and Transparent Supply Chain Management using Blockchain and IoT." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (October 7, 2023): 01–12. http://dx.doi.org/10.17762/ijritcc.v11i11s.8064.
Full textZheng, Ping, Tingting Jiang, and Fachang Wang. "Research on Auxiliary Devices for English Teaching under Intelligent Internet of Things." Mobile Information Systems 2022 (September 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/8031846.
Full textAbdulghani, Hezam Akram, Niels Alexander Nijdam, Anastasija Collen, and Dimitri Konstantas. "A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective." Symmetry 11, no. 6 (June 10, 2019): 774. http://dx.doi.org/10.3390/sym11060774.
Full textLeng, Jiewu, Ziying Chen, Zhiqiang Huang, Xiaofeng Zhu, Hongye Su, Zisheng Lin, and Ding Zhang. "Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions." Machines 10, no. 10 (September 26, 2022): 858. http://dx.doi.org/10.3390/machines10100858.
Full textAsano, Mizuki, Takumi Miyoshi, and Taku Yamazaki. "Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments." Future Internet 16, no. 1 (December 31, 2023): 17. http://dx.doi.org/10.3390/fi16010017.
Full textLipps, Christoph, Annika Tjabben, Matthias Rüb, Jan Herbst, Sogo Pierre Sanon, Rekha Reddy, Yorman Munoz, and Hans D. Schotten. "Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 267–75. http://dx.doi.org/10.34190/eccws.22.1.1207.
Full textRizwan, Ali, Dimitrios A. Karras, Jitendra Kumar, Manuel Sánchez-Chero, Marlon Martín Mogollón Taboada, and Gilder Cieza Altamirano. "An Internet of Things (IoT) Based Block Chain Technology to Enhance the Quality of Supply Chain Management (SCM)." Mathematical Problems in Engineering 2022 (July 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/9679050.
Full textNicol, Rozenn, and Jean-Yves Monfort. "Acoustic research for telecoms: bridging the heritage to the future." Acta Acustica 7 (2023): 64. http://dx.doi.org/10.1051/aacus/2023056.
Full textAhad, Abdul, Mohammad Tahir, Muhammad Aman Sheikh, Kazi Istiaque Ahmed, Amna Mughees, and Abdullah Numani. "Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review." Sensors 20, no. 14 (July 21, 2020): 4047. http://dx.doi.org/10.3390/s20144047.
Full textAdebayo Olusegun Aderibigbe, Peter Efosa Ohenhen, Nwabueze Kelvin Nwaobia, Joachim Osheyor Gidiagba, and Emmanuel Chigozie Ani. "ADVANCED SENSING TECHNIQUES IN ELECTRO-MECHANICAL SYSTEMS: SURVEYING THE RISE OF SMART SENSORS AND THEIR IMPLICATIONS FOR SYSTEM ROBUSTNESS." Engineering Science & Technology Journal 4, no. 6 (December 3, 2023): 323–40. http://dx.doi.org/10.51594/estj.v4i6.628.
Full textPrasad, S. Rajendra, and M. Gopichand Naik. "A Review on Wind Power Forecasting Models for improved Renewable Energy Integration." International Conference on Information Science and Technology Innovation (ICoSTEC) 1, no. 1 (February 26, 2022): 35–40. http://dx.doi.org/10.35842/icostec.v1i1.20.
Full textTrifunović, Darko, and Zoran Bjelica. "Cyber War - Trends and Technologies." National security and the future 21, no. 3 (March 1, 2021): 65–94. http://dx.doi.org/10.37458/nstf.21.3.2.
Full textAbdull Rashid, Nur Farahin, Asma' Abu-Samah, Aishah Mohd Noh, Noor Zaim Syafiq Azam, Nur Najihah Wahid, Chee Qin Chiang, Haider Alobaidy, Nor Fadzilah Abdullah, Sawal Abdul Hamid, and Rosdiadee Nordin. "DEVELOPMENT OF SMART CAMPUS APPLICATIONS BASED ON WIRELESS TECHNOLOGIES USING OPEN-SOURCE PLATFORMS." Jurnal Teknologi 84, no. 3 (March 31, 2022): 173–84. http://dx.doi.org/10.11113/jurnalteknologi.v84.16732.
Full textAbdull Rashid, Nur Farahin, Asma' Abu-Samah, Aishah Mohd Noh, Noor Zaim Syafiq Azam, Nur Najihah Wahid, Chee Qin Chiang, Haider Alobaidy, Nor Fadzilah Abdullah, Sawal Abdul Hamid, and Rosdiadee Nordin. "DEVELOPMENT OF SMART CAMPUS APPLICATIONS BASED ON WIRELESS TECHNOLOGIES USING OPEN-SOURCE PLATFORMS." Jurnal Teknologi 84, no. 3 (March 31, 2022): 173–84. http://dx.doi.org/10.11113/jurnalteknologi.v84.16732.
Full textWang, Jiazheng, Xiuhua Fu, Rongqun Peng, and Michel Kadoch. "An Innovative Infrastructure Based on Shape-Adaptive RIS for Smart Industrial IoTs." Electronics 11, no. 3 (January 27, 2022): 391. http://dx.doi.org/10.3390/electronics11030391.
Full textYang, Qian, Jiaming Zhang, Junjie Zhang, Cailing Sun, Shanyi Xie, Shangdong Liu, and Yimu Ji. "Graph Transformer Network Incorporating Sparse Representation for Multivariate Time Series Anomaly Detection." Electronics 13, no. 11 (May 23, 2024): 2032. http://dx.doi.org/10.3390/electronics13112032.
Full textBanerjee, Indrajit, Jared Robinson, Abhishek Kashyap, Poornasha Mohabeer, and Brijesh Sathian. "COVID-19 and Artificial Intelligence: the pandemic pacifier." Nepal Journal of Epidemiology 10, no. 4 (December 31, 2020): 919–22. http://dx.doi.org/10.3126/nje.v10i4.33334.
Full textKaczmarczyk, Barbara, and Karolina Lis. "Perception of the Transition to a Zero-Emission Economy in the Opinion of Polish and Foreign Students: A Comparative Analysis." Energies 16, no. 18 (September 8, 2023): 6486. http://dx.doi.org/10.3390/en16186486.
Full textAcquah-Andoh, Elijah, Augustine Ifelebuegu, and Stephen Theophilus. "Brexit and UK Energy Security: Perspectives from Unconventional Gas Investment and the Effects of Shale Gas on UK Energy Prices." Energies 12, no. 4 (February 14, 2019): 600. http://dx.doi.org/10.3390/en12040600.
Full textMizin, V. "Outlines of Strategic Stability in Global Multipolar Competition." International Trends / Mezhdunarodnye protsessy 18, no. 2 (2020): 141–68. http://dx.doi.org/10.17994/it.2020.18.2.61.8.
Full text