Letteratura scientifica selezionata sul tema "Internet des objets – Protection"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Internet des objets – Protection".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Internet des objets – Protection":
Haza, Marion. "Objets culturels dystopiques et adolescence". Topique 160, n. 1 (1 gennaio 2024): 97–110. http://dx.doi.org/10.3917/top.160.0097.
Meiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management". Sécurité et stratégie 32, n. 4 (19 marzo 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
WANG, Haixiang, Jingyi CAO e Zhe LIU. "Energy Internet and Its Trusted Protection Architecture". Wuhan University Journal of Natural Sciences 27, n. 2 (aprile 2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.
Samahalska, Y. "Personal data protection in the Internet". Uzhhorod National University Herald. Series: Law 2, n. 82 (10 giugno 2024): 259–63. http://dx.doi.org/10.24144/2307-3322.2024.82.2.41.
Logvynenko, M. I., I. V. Karikh e A. V. Dykovets. "Problems of protection of copyright objects in the network Internet". Legal Horizons 15, n. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p21.
Logvynenko, M. I., I. V. Karikh e A. V. Dykovets. "Problems of protection of copyright objects in the network Internet". Legal Horizons 15, n. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p:21.
Moskalenko, I. A. "Registration of works as a tool to protect copyright in cross-border relations (Internet)". Actual Problems of Russian Law, n. 3 (4 maggio 2019): 142–50. http://dx.doi.org/10.17803/1994-1471.2019.100.3.142-150.
Kurniawan Sihombing, Agung, Rika Ratna Permata e Tasya Safiranita Ramli. "Comparison of Digital Copyright Protection on Over the Top (OTT) Streaming Content Media in Indonesia and the United States". PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 8, n. 2 (2021): 183–212. http://dx.doi.org/10.22304/pjih.v8n2.a2.
Idrisov, Hussein V. "Certain issues of legal regulation of the placement of intellectual property objects on the Internet: problematic aspects and search for solutions". Current Issues of the State and Law, n. 4 (2022): 556–66. http://dx.doi.org/10.20310/2587-9340-2022-6-4-556-566.
Et. al., Harish Kumar N,. "Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n. 11 (10 maggio 2021): 501–7. http://dx.doi.org/10.17762/turcomat.v12i11.5913.
Tesi sul tema "Internet des objets – Protection":
Nicomette, Vincent. "La protection dans les systèmes à objets répartis". Phd thesis, Institut National Polytechnique de Toulouse - INPT, 1996. http://tel.archives-ouvertes.fr/tel-00175252.
Morel, Victor. "Enhancing transparency and consent in the internet of things". Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI073.
In an increasingly connected world, the Internet permeates every aspect of our lives. The number of devices connected to the global network is rising, with prospects foreseeing 75 billions devices by 2025. The Internet of Things envisioned twenty years ago is now materializing at a fast pace, but this growth is not without consequence. The increasing number of devices raises the possibility of surveillance to a level never seen before. A major step has been taken in 2018 to safeguard privacy, with the introduction of the General Data Protection Regulation (GDPR) in the European Union. It imposes obligations to data controllers on the content of information about personal data collection and processing, and on the means of communication of this information to data subjects. This information is all the more important that it is required for consent, which is one of the legal grounds to process personal data. However, the Internet of Things can pose difficulties to implement lawful information communication and consent management. The tension between the requirements of the GDPR for information and consent and the Internet of Things cannot be easily solved. It is however possible. The goal of this thesis is to provide a solution for information communication and consent management in the Internet of Things from a technological point of view. To do so, we introduce a generic framework for information communication and consent management in the Internet of Things. This framework is composed of a protocol to communicate and negotiate privacy policies, requirements to present information and interact with data subjects, and requirements over the provability of consent. We support the feasibility of this generic framework with different options of implementation. The communication of information and consent through privacy policies can be implemented in two different manners: directly and indirectly. We then propose ways to implement the presentation of information and the provability of consent. A design space is also provided for systems designers, as a guide for choosing between the direct and the indirect implementations. Finally, we present fully functioning prototypes devised to demonstrate the feasibility of the framework’s implementations. We illustrate how the indirect implementation of the framework can be developed as a collaborative website named Map of Things. We then sketch the direct implementation combined with the agent presenting information to data subjects under the mobile application CoIoT
Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets". Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242.
Internet of Things (IoT) and IT service outsourcing technologies have led to the emergence of new threats to users' privacy. However, the implementation of traditional security measures on IoT equipment is a first challenge due to capacity limitations. On the other hand, the offloading of data processing and storage poses the problem of trust in service providers.In this context, we have proposed an encryption solution that provides owner-centric data protection adapted to the constraining environment of IoT. This model is based on attribute-based encryption with secure offloading capability and Blockchain technology. Then, in response to the issue of trust and service selection, we explored the possibilities offered by artificial intelligence tools. To do this, we proposed a collaborative filtering model based on Kohonen maps and efficient solution to detect the untrusted users
Ould, yahia Youcef. "Proposition d’un modèle de sécurité pour la protection de données personnelles dans les systèmes basés sur l’internet des objets". Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1242/document.
Internet of Things (IoT) and IT service outsourcing technologies have led to the emergence of new threats to users' privacy. However, the implementation of traditional security measures on IoT equipment is a first challenge due to capacity limitations. On the other hand, the offloading of data processing and storage poses the problem of trust in service providers.In this context, we have proposed an encryption solution that provides owner-centric data protection adapted to the constraining environment of IoT. This model is based on attribute-based encryption with secure offloading capability and Blockchain technology. Then, in response to the issue of trust and service selection, we explored the possibilities offered by artificial intelligence tools. To do this, we proposed a collaborative filtering model based on Kohonen maps and efficient solution to detect the untrusted users
Celosia, Guillaume. "Privacy challenges in wireless communications of the Internet of Things". Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI069.
Also known as the Internet of Things (IoT), the proliferation of connected objects offers unprecedented opportunities to consumers. From fitness trackers to medical assistants, through smarthome appliances, the IoT objects are evolving in a plethora of application fields. However, the benefits that they can bring to our society increase along with their privacy implications. Continuously communicating valuable information via wireless links such as Bluetooth and Wi-Fi, those connected devices support their owners within their activities. Most of the time emitted on open channels, and sometimes in the absence of encryption, those information are then easily accessible to any passive attacker in range. In this thesis, we explore two major privacy concerns resulting from the expansion of the IoT and its wireless communications: physical tracking and inference of users information. Based on two large datasets composed of radio signals from Bluetooth/BLE devices, we first defeat existing anti-tracking features prior to detail several privacy invasive applications. Relying on passive and active attacks, we also demonstrate that broadcasted messages contain cleartext information ranging from the devices technical characteristics to personal data of the users such as e-mail addresses and phone numbers. In a second time, we design practical countermeasures to address the identified privacy issues. In this direction, we provide recommendations to manufacturers, and propose an approach to verify the absence of flaws in the implementation of their protocols. Finally, to further illustrate the investigated privacy threats, we implement two demonstrators. As a result, Venom introduces a visual and experimental physical tracking system, while Himiko proposes a human interface allowing to infer information on IoT devices and their owners
Lanna, Maximilien. "La protection des données à caractère personnel à l’épreuve de l’automesure connectée". Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020026.
Personal data protection law is today at a turning point : its core principles are weakened by self-tracking technologies, thus reducing protection of individuals. In order to determine how new technologies affect the law, this study aims to figure ou the paradigm shift that has been implemented by the new RGPD and its consequences on personal data protection
Junges, Pierre-Marie. "Évaluation à l'échelle de l'Internet du niveau d'exposition des objets connectés face aux risques de sécurité". Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0078.
Nowadays, the use of Internet of Things (IoT) devices in our personal and work space makes our everyday life easier, but those IoT devices often suffer from security issues. The objective of this thesis is to evaluate the security of IoT devices. On one hand, we investigate the risk of user privacy leakage introduced by IoT hubs (or IoT gateways). Those IoT hubs act as a middlebox between a user and the IoT devices. Existing passive fingerprinting techniques are not applicable in this configuration considering that the network traffic of each individual IoT device attached to the IoT hub is not accessible. We propose a passive fingerprinting technique to infer the user actions by analysing the network traffic of the IoT gateway. Our method works on encrypted network traffic, and consists of decomposing a packet payload size into a set of, potential, user actions. We applied our technique on one IoT gateway controlling up to 16 IoT devices and show that an attacker, located on the Internet, is able to infer the user actions in more than 91.2% of the investigated cases.In a further step, we propose a hybrid firmware analysis technique to evaluate the security of an IoT device by inspecting the content of its firmware. Our analysis combines a dynamic analysis and a static analysis to improve our chances to extract data. Our objectives are not to detect unknown vulnerabilities but only the known ones, and inspect if the binaries included are deprecated. We applied our analysis on 4,730 firmwares belonging to IoT devices released between 2009 and 2019, and noticed the widespread use of a small set of binaries, notably to deploy HTTP and SSH services. From 2017, we observed that IoT manufacturers implemented many updates which reduced the exposure to known vulnerabilities.Using those firmwares, we defined an active fingerprinting technique allowing an attacker to infer details about a connected IoT devices, such as its brand or the binary used to deploy the HTTP server. Thanks to the firmware content, we can 1) obtain precise information about the binaries (name, version), and 2) assume the services actually deployed by the device i.e., the results of a TCP/UDP port scans. Considering those two aspects, our method consists of training classifiers to predict one particular property of a connected IoT device from, among others, the supposed results of a TCP/UDP port scans. Our method allows to predict fine details such as the name or version of a binary, the usernames or the passwords present in an IoT device. Using our approach, we noticed that the predictions of the name and version of the HTTP, SSH and DNS binaries are achieved with a precision superior to 73.14%. On the other hand, the prediction of at least one valid password is more challenging and requires up to two tries. Our method is more effective and furtive than a naive brute-force method.Knowing the vulnerabilies present in a IoT device does not guarantee that attackers use them on a regular basis. Hence, we propose in our fourth contribution, a high interaction honeypot capable of intercepting cyberattacks targeting IoT devices. The defined honeypot is based on an existing emulation technique that uses IoT devices firmwares. Implementing an honeypot is hard, and because of the stealth constraint, the existing emulation technique could not be used as-is. Due to this constraint, we implemented a framework capable of emulating IoT devices while assuring their furtivity, and adding honeypot-specific capabilities, such as exfiltrating the attackers activities. We then compared our approach to the state of the art one, and showed that ours can emulate up to 825 (82.5%) devices compared to 454 (45.4%). Our honeypot was deployed on one server during about one year and captured unknown and recent attacks from botnets, and sometimes humans
Moreira, da Costa Thiago. "OPP_IoT An ontology-based privacy preservation approach for the Internet of Things". Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM003/document.
The spread of pervasive computing through the Internet of Things (IoT) represents a challenge for privacy preservation.Privacy threats are directly related to the capacity of the IoT sensing to track individuals in almost every situation of their lives.Allied to that, data mining techniques have evolved and has been used to extract a myriad of personal information from sensor data stream.This trust model relies on the trustworthiness of the data consumer who should infer only intended information.However, this model exposes personal information to privacy adversary.In order to provide a privacy preservation for the IoT, we propose a privacy-aware virtual sensor model that enforces privacy policy in the IoT sensing as a service.This mechanism intermediates physical sensors and data consumers.As a consequence, we are able to optimize the use of privacy preserving techniques by applying them selectively according to virtual sensor inference intentions, while preventing malicious virtual sensors to execute or get direct access to raw sensor data.In addition, we propose an ontology to classify personal information based on the Behavior Computing, facilitating privacy policy definition and information classification based on the behavioral contexts
Diop, Aïda Abdou. "Cryptographic mechanisms for device authentication and attestation in the internet of things". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS023.
The new decentralized computing paradigm introduced by Machine-to-Machine (M2M) communications and the Internet of Things (IoT) ecosystem requires developing new security mechanisms and frameworks, adapted to this new architecture. The variety of IoT use cases includes applications leveraging low-level devices such as sensor or actuators, to applications deploying safety critical devices such as connected vehicles in Intelligent Transportation Systems (ITS). Devices are deployed as nodes in communication networks, and have become in recent years targets for attackers who exploit the resource-constrained nature of the devices in order to compromise the safety, security, and availability of the different applications. Two of the main challenges in this ecosystem are securing the communication between IoT devices, and ensuring that devices in the network have not been compromised or tampered with, thus attesting of the integrity of the entire network. The challenges are exacerbated by the nature of devices, which present stringent constraints, notably in terms of computational capabilities, storage space, and energy resource. In addition, new privacy concerns affecting users in IoT applications have risen, and require implementing privacy-friendly authentication and attestation mechanisms.Authentication mechanisms allow systems to identify themselves on the network, and provide solutions for the first challenge. Remote Attestation is a security mechanism which enables control systems to verify the software state of devices in the network, thus detecting any tampering or remote malware injection attacks.In this thesis, we aim to contribute to the development of new and privacy-preserving authentication and attestation mechanisms, which are particularly adapted for implementation in constrained environments.In the first part of this thesis, we leverage a cryptographic mechanism deployed in trusted computing, namely Direct Anonymous Attestation (DAA), in order to provide decentralized, and privacy-preserving authentication protocols adapted for constrained environments. Our work contributes to the development of a variant of Direct Anonymous Attestation schemes, called pre-Direct Anonymous Attestation (pre-DAA), which achieves a trade-off between security andefficiency that was not previously achieved in the literature. In particular, our pre-DAA scheme is proven secure in the Random Oracle Model (ROM) under the q-Strong Diffie Hellman (q—SDH) assumption, while performing better than DAA schemes proven secure under an interactive assumption. The pre-DAA scheme is subsequently used in the development of two privacy-preserving authentication protocols. The first application of our pre-DAA scheme consists in the design of a decentralized architecture for secure communication in vehicular ad hoc networks, which removes the need for a centralize Public Key Infrastructure. The second application of our pre-DAA scheme is the design of a mobile-based access control protocol for public transport systems, which addresses the issue of user traceability inherent to current access control control protocols for transport systems.In the second part of this thesis, we address the device integrity verification challenge by designing a remote attestation protocol which enables the secure and efficient attestation of groups (or swarms) of devices. Our attestation protocol verifies the integrity of every device in the network during a single attestation phase, by leveraging the aggregating properties of an aggregate algebraic MAC scheme. Compared to swarm attestation protocols in the literature, our contribution enables the detection of an erroneous attestation report in the aggregated result, thus allowing the identification of compromised devices
Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes". Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
The Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation
Libri sul tema "Internet des objets – Protection":
Piette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Paris: Lexis Nexis, 2015.
Maksurov, Aleksey. The use of special knowledge in proving cases of crimes and offenses on the Internet. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1915941.
Poulot, Dominique. L'art d'aimer les objets. Québec, Québec]: Presses de l'Université Laval, 2016.
Moura Vicente, Dário, e Sofia de Vasconcelos Casimiro, a cura di. Data Protection in the Internet. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-28049-9.
Savoy, Bénédicte. Objets du désir, désir d'objets. [Paris]: Collège de France, 2017.
Dreyfus, Nathalie. Marques et Internet: Protection, valorisation, défense. Rueil-Malmaison: Lamy, 2011.
Galiardo, Antonio Cayón. Internet y derecho. Zaragoza: Gobierno de Aragon, Departamento de Presidencia y Relaciones Institucionales, 2001.
Ziegler, Sébastien, a cura di. Internet of Things Security and Data Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.
Andrieux, Jean-Yves. Le patrimoine monumental: Sources, objets et représentations. Rennes: Presses universitaires de Rennes, 2014.
Spain e Spain. Código de Internet. 3a ed. Cizur Menor, Navarra: Thomson/Aranzadi, 2007.
Capitoli di libri sul tema "Internet des objets – Protection":
Eswaran, Subha P. "Intelligent Environment Protection". In Internet of Things (IoT), 335–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37468-6_18.
Abadi, Martín. "Protection in Programming-Language Translations". In Secure Internet Programming, 19–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_2.
Giannopoulou, Alexandra, e Valeria Ferrari. "Distributed Data Protection and Liability on Blockchains". In Internet Science, 203–11. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17705-8_17.
Roth, Volker. "Mutual Protection of Co-operating Agents". In Secure Internet Programming, 275–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48749-2_13.
Rahim, Eva Rose. "Information Security in the Internet Age". In Beyond Data Protection, 157–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_9.
Appleman, Dan. "Passwords: Your Key to the Internet". In Always Use Protection, 159–72. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0904-1_11.
Wu, Chuan-Kun. "Privacy Protection in IoT Applications". In Internet of Things Security, 137–54. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1372-2_9.
Moura Vicente, Dário, e Sofia de Vasconcelos Casimiro. "Data Protection in the Internet". In Ius Comparatum - Global Studies in Comparative Law, 611–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48675-4_22.
Leonti, Wolfgang C. "Protection of Internet Domain Names". In Key Aspects of German Business Law, 115–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-540-24776-0_11.
Dhanoa, Amanpreet Singh. "Implementation of Protection Protocols for Security Threats in SDN". In Internet of Things, 247–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89328-6_14.
Atti di convegni sul tema "Internet des objets – Protection":
Fleck, Andreas, e Florian Kammüller. "Implementing Privacy with Erlang Active Objects". In 2010 Fifth International Conference on Internet Monitoring and Protection. IEEE, 2010. http://dx.doi.org/10.1109/icimp.2010.27.
Saiz-Laudo, Raul, e Marc Sanchez-Artigas. "Egeon: Software-Defined Data Protection for Object Storage". In 2022 22nd International Symposium on Cluster, Cloud and Internet Computing (CCGrid). IEEE, 2022. http://dx.doi.org/10.1109/ccgrid54584.2022.00019.
Qiu, Zhen, Takeshi Ikenaga e Satoshi Goto. "Robust Scalable Video Transmission using Object-Oriented Unequal Loss Protection over Internet". In APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/apccas.2006.342547.
Kambovski, Igor. "SIGURNOST ČUVANjA I PRENOSA PODATAKA I INFORMACIJA KOD ELEKTRONSKE TRGOVINE I ELEKTRONSKOG (INTERNET) BANKARSTVA". In XV Majsko savetovanje: Sloboda pružanja usluga i pravna sigurnost. University of Kragujevac, Faculty of Law, 2019. http://dx.doi.org/10.46793/xvmajsko.899k.
Didero, Rachele, e Giovanni Maria Conti. "CAPABLE: Engineering, textile, and fashion Collaboration, for citizens' Awareness and Privacy Protection". In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001536.
Stoica, Marian, Marinela Mircea e Bogdan Ghilicmicu. "USING BLOCKCHAIN TECHNOLOGY IN SMART UNIVERSITY". In eLSE 2020. University Publishing House, 2020. http://dx.doi.org/10.12753/2066-026x-20-187.
Đorđević, Mihailo, Milan Pižurica, Vojkan Nikolić, Anja Kostić – Zobenica e Sanja Stanisavljev. "Web service protection". In International conference on Applied Internet and Information Technologies. Prof. Sasho Korunovski, PhD, Rector “St Kliment Ohridski” University - Bitola Republic of Macedonia, 2018. http://dx.doi.org/10.20544/aiit2018.p28.
SHishov, E. I., e T. A. Ahmedov. "Copyright and protection on the Internet". In XXI All-Russian Scientific and Practical Conference young scientists, graduate students and students in Neryungri, with international participation. Tekhnicheskogo instituta (f) SVFU, 2020. http://dx.doi.org/10.18411/tifsvfu-2020-c2-157-82.
Wu, Lijin, Yaming Zhang, Zehua Shen, Yang Jian e Longli Tang. "Trustworthy Protection Technology for Industrial Internet". In 2022 9th International Conference on Dependable Systems and Their Applications (DSA). IEEE, 2022. http://dx.doi.org/10.1109/dsa56465.2022.00076.
Jonker, Mattijs, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre e Aiko Pras. "Measuring the Adoption of DDoS Protection Services". In IMC 2016: Internet Measurement Conference. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2987443.2987487.
Rapporti di organizzazioni sul tema "Internet des objets – Protection":
Zhuo, Ran, Bradley Huffaker, KC Claffy e Shane Greenstein. The Impact of the General Data Protection Regulation on Internet Interconnection. Cambridge, MA: National Bureau of Economic Research, novembre 2019. http://dx.doi.org/10.3386/w26481.
Cunha e Melo, Mariana, e Jonas de Abreu Castro. Section 230 and the future of the internet. Center for Technology and Public Interest, SL, marzo 2023. http://dx.doi.org/10.59262/ejp3ba.
Aubry, Philippe, Nicolas Boileau, Marie Briandy, Marie-Christine Chauvat, Sandrine Conin e Éric Min-Tung. Rapport sur le chantier IdRef en Normandie. Normandie Université, dicembre 2023. http://dx.doi.org/10.51203/rapport.nu.000003.
Krishnaswamy, Sudhir, e Jayna Kothari. Rights in Review: The Supreme Court in 2015. Centre for Law and Policy Research, gennaio 2016. http://dx.doi.org/10.54999/yvjn7797.
Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song e Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, gennaio 2022. http://dx.doi.org/10.18235/0003930.
Jones, Emily, Beatriz Kira, Anna Sands e Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, febbraio 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.
Sokolovsky, Dmitry, Sergey Sokolov e Alexey Rezaykin. e-learning course "Informatics". SIB-Expertise, gennaio 2024. http://dx.doi.org/10.12731/er0785.29012024.
Saha, Devanik. Shockproof and Inclusive Fiscal Policies. Institute of Development Studies, luglio 2023. http://dx.doi.org/10.19088/core.2023.005.
BACCELLI, François, Sébastien CANDEL, Guy PERRIN e Jean-Loup PUGET. Large Satellite Constellations: Challenges and Impact. Académie des sciences, marzo 2024. http://dx.doi.org/10.62686/3.
BACCELLI, François, Sébastien CANDEL, Guy PERRIN e Jean-Loup PUGET. Grandes Constellations de Satellites : Enjeux et Impacts. Académie des sciences, marzo 2024. http://dx.doi.org/10.62686/2.