Gotowa bibliografia na temat „Conventional security on future things”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Conventional security on future things”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Conventional security on future things"
U. Harita, Ms, i K. V.DayaSagar. "A survey on secured internet of things architecture". International Journal of Engineering & Technology 7, nr 2.7 (18.03.2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.
Pełny tekst źródłaAlshehri, Mohammed. "Blockchain-assisted cyber security in medical things using artificial intelligence". Electronic Research Archive 31, nr 2 (2022): 708–28. http://dx.doi.org/10.3934/era.2023035.
Pełny tekst źródłaPatil, Shamshekhar S., i Arun Biradar. "Novel authentication framework for securing communication in internet-of-things". International Journal of Electrical and Computer Engineering (IJECE) 10, nr 1 (1.02.2020): 1092. http://dx.doi.org/10.11591/ijece.v10i1.pp1092-1100.
Pełny tekst źródłaQiu, Xiaoying, Jinwei Yu, Wenying Zhuang, Guangda Li i Xuan Sun. "Channel Prediction-Based Security Authentication for Artificial Intelligence of Things". Sensors 23, nr 15 (27.07.2023): 6711. http://dx.doi.org/10.3390/s23156711.
Pełny tekst źródłaQasim, Hiba Adnan, i Rana Saad Mohammed. "Lightweight Steganography Technique in The Internet of Things: A survey". Al-Salam Journal for Engineering and Technology 3, nr 1 (18.11.2023): 97–108. http://dx.doi.org/10.55145/ajest.2024.03.01.008.
Pełny tekst źródłaDu, Qinghe, Ying Xu, Wanyu Li i Houbing Song. "Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes". Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8404219.
Pełny tekst źródłaS.P. Revathy, N. MadhiVathani, NaafiahFathima i A. MohammedIlyas. "Prediction and Prevention of Theft in Jewellery Shop". IRO Journal on Sustainable Wireless Systems 5, nr 3 (wrzesień 2023): 194–206. http://dx.doi.org/10.36548/jsws.2023.3.002.
Pełny tekst źródłaArora, Priyanka, i Ritu Makani. "Blockchain Integration with AIoT Data Security and Privacy for Sustainability". Journal of Artificial Intelligence and Systems 6, nr 1 (2024): 112–23. http://dx.doi.org/10.33969/ais.2024060108.
Pełny tekst źródłaB Kolhapuri, Sammed, Sanket V Shenvi, Sheetal R Kulkarni i Ambika Naik Y. "Survey Paper on “IoT-Driven Aquaponics for Sustainable Agriculture”". IRO Journal on Sustainable Wireless Systems 6, nr 1 (marzec 2024): 28–47. http://dx.doi.org/10.36548/jsws.2024.1.003.
Pełny tekst źródłaTok, Yen Xin, Norliza Katuk i Ahmad Suki Che Mohamed Arif. "Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone". International Journal of Interactive Mobile Technologies (iJIM) 15, nr 24 (21.12.2021): 32–48. http://dx.doi.org/10.3991/ijim.v15i24.25393.
Pełny tekst źródłaRozprawy doktorskie na temat "Conventional security on future things"
Kao, Wiyao. "Le contrat portant sur une chose future : essai d’une théorie générale". Electronic Thesis or Diss., Poitiers, 2020. http://www.theses.fr/2020POIT3015.
Pełny tekst źródłaThe expression "contract relating to a future thing" means that the contracting parties may validly stipulate that the thing due will be future; they may thus contract on a tangible or intangible thing that does not yet exist, at least in its entirety. Since the Roman sale of a future thing, contracts relating to a future thing have diversified. The practice of these contracts has become commonplace because of their economic importance. Taking the measure of this diversity and richness, reflection on the contract for a future thing has been considered under the heading of general theory. Contracts relating to a future thing are familiar figures without necessarily being noticed. It was necessary to identify them first of all. What characterizes them, and what is quickly apparent, is that each of these contracts presupposes a future thing which constitutes their object; this study proposes a clear and distinct definition of them. What is perhaps less obvious from an analysis of these contracts, and yet characteristic of them, is that they are always commutative contracts and not random contracts. This feature shows that the Roman theory of the sale of a future thing, as it has always been presented, must be used today with great care to explain the whole mechanism of the contract for a future thing. The identification of the contract relating to a future thing continued with a reference to anticipation. This is a doctrinal explanation of former article 1130, paragraph 1, of the Civil Code, which provided: "The subject-matter of an obligation may be a future thing". It explains even today, after the reform of the law of contract, the new article 1163, paragraph 1. These three references or criteria (the future thing, the absence of contingency and anticipation) have made it possible to identify, on the one hand, special contracts relating to a future thing and, on the other hand, contractual securities relating to a future thing. Once the various contracts relating to a future thing had been identified, it was important to study their legal regime in a second stage. A contract relating to a future thing is distinguished by two common and specific rules: first, the debtor is under a prior obligation to do something which consists in making the promised thing happen by participating in its creation or by executing another contract; and second, the creditor has a possible right, which is the pure and simple right in germ, in favour of the creditor. Moreover, most of the developments on the validity and non-performance of a contract relating to a future thing fall under the general law of contract. The problems discussed did not make it possible to identify any specific features relating to the aspect of the future thing, the object of the service.In terms of the concept and the regime, there are a total of five common criteria and rules on which to base a general theory of the contract relating to a thing in the future
Aqeel, Muhammad. "Internet of Things : Systematic literature review of security and future research". Thesis, Uppsala universitet, Informationssystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420118.
Pełny tekst źródłaBude, Cristian, i Bergstrand Andreas Kervefors. "Internet of Things : Exploring and Securing a Future Concept". Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.
Pełny tekst źródłaInternet of Things (IoT) är ett koncept som omfattar olika objekt och kommunikationsmetoder för utbyte av information. Idag är IoT mer en beskrivande term av den framtidsvision som finns att allting ska vara uppkopplat på internet. IoT kommer vara fundamentalt i framtiden eftersom konceptet öppnar upp möjligheter för nya tjänster samt nya innovationer. Då alla objekt ska vara uppkopplade och kunna kommunicera med varandra samtidigt som de skall kunna operera i oskyddade miljöer, bidrar detta till stora säkerhetsutmaningar. Dagens IoT är i stort behov av standardisering och klara strukturer för hur tekniken ska implementeras samt samverka med varandra på ett säkert sätt. Utmaningarna ligger i att säkra tekniken samt informationen som tekinken bidrar med. Denna rapport ger en introduktion till vad IoT är och hur det kan användas samt vilka hot som IoT kan möta i avseende till informationssäkerhet. Utöver detta så förser rapporten läsaren med förslag om hur man eventuellt kan lösa de fundamentala behoven av autentisering och säker kommunikation. Lösningarna som läggs fram är baserade på både nutida lösningar och teknik som är under utveckling inför framtiden. Nutida lösningar är baserade på säkerhetsprotokoll som IPsec och DTLS som används i en miljö som sträcker över internet och in i ett 6LoWPAN nätverk. Den autentiseringslösning som tagits fram grundar sig på PKI och förtroendemodeller för certifikathantering. För framtida arbete presenteras flertalet vidare fördjupningsområden där denna rapport kan användas som grund. Dessa fördjupningsområden inkluderar vidare analys av sårbarheter och implementation av de lösningar som tagits fram.
DUSHKU, EDLIRA. "Remote attestation to ensure the security of future Internet of Things services". Doctoral thesis, 2020. http://hdl.handle.net/11573/1382715.
Pełny tekst źródłaKsiążki na temat "Conventional security on future things"
Sloan, Stanley R. Conventional arms control and Europe's future. New York, N.Y: Foreign Policy Association, 1989.
Znajdź pełny tekst źródłaA, Millen Raymond, i Army War College (U.S.). Strategic Studies Institute., red. Future war, future battlespace: The strategic role of American landpower. [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2003.
Znajdź pełny tekst źródłaBonen, Zeev. Advanced technology and future warfare. Ramat Gan, Israel: BESA Center, Bar-Ilan University, 1996.
Znajdź pełny tekst źródłaUnited States. Government Accountability Office. Operation Iraqi Freedom: DOD should apply lessons learned concerning the need for security over conventional munitions storage sites to future operations planning : report to congressional committees. [Washington, D.C.]: United States Government Accountability Office, 2007.
Znajdź pełny tekst źródłaGrauer, Ryan. Conventional Interstate Warfare. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0027.
Pełny tekst źródłaNatalie, Klein. 26 Maritime Security. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198715481.003.0026.
Pełny tekst źródłaWong, Wilson W. S. Emerging Military Technologies. ABC-CLIO, LLC, 2013. http://dx.doi.org/10.5040/9798400645068.
Pełny tekst źródłaClark, Robert, Raimond Maurer i Olivia S. Mitchell. How Persistent Low Returns Will Shape Saving and Retirement. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198827443.003.0001.
Pełny tekst źródłaSatpathy, Suneeta, Sachi Nandan Mohanty, Tanupriya Choudhury, Subhendu Kumar Pani i Bhagirathi Nayak. Wireless Sensor Networks and the Internet of Things: Future Directions and Applications. Apple Academic Press, Incorporated, 2021.
Znajdź pełny tekst źródłaSatpathy, Suneeta, Sachi Nandan Mohanty, Tanupriya Choudhury, Subhendu Kumar Pani i Bhagirathi Nayak. Wireless Sensor Networks and the Internet of Things: Future Directions and Applications. Apple Academic Press, Incorporated, 2021.
Znajdź pełny tekst źródłaCzęści książek na temat "Conventional security on future things"
Maheshwary, Priti, i Timothy Malche. "Safeguarding the Connected Future: Security in Internet of Things (IoT)". W Internet of Things Security, 55–86. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338642-4.
Pełny tekst źródłaMinh, Quang Tran, Phat Nguyen Huu, Takeshi Tsuchiya i Michel Toulouse. "Openness in Fog Computing for the Internet of Things". W Future Data and Security Engineering, 343–57. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_23.
Pełny tekst źródłaAgarwal, Puja, Anjana Mishra i Brojo Kishore Mishra. "The Future Security Solution to the Internet of Things: Biometric Technology". W Internet of Things, 163–74. New York: Apple Academic Press, 2023. http://dx.doi.org/10.1201/9781003304609-9.
Pełny tekst źródłaArévalo, Rodrigo Alexander Fagua, Octavio José Salcedo Parra i Juan Manuel Sánchez Céspedes. "Security for the Internet of Things and the Bluetooth Protocol". W Future Data and Security Engineering, 74–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03192-3_7.
Pełny tekst źródłaHamad, Salma Abdalla, Quan Z. Sheng i Wei Emma Zhang. "Conclusion and Future Directions". W Security Framework for The Internet of Things Applications, 102–8. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003478683-6.
Pełny tekst źródłaTôn, Long-Phuoc, Lam-Son Lê i Hoang-Anh Pham. "Towards a Domain Specific Framework for Wearable Applications in Internet of Things". W Future Data and Security Engineering, 309–24. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70004-5_22.
Pełny tekst źródłaQureshi, Kashif Naseer, Thomas Newe, Rosheen Qazi i Gwanggil Jeon. "Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends". W Internet of Things, 291–306. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33808-3_16.
Pełny tekst źródłaSrivastava, Gautam, Reza M. Parizi i Ali Dehghantanha. "The Future of Blockchain Technology in Healthcare Internet of Things Security". W Advances in Information Security, 161–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3_9.
Pełny tekst źródłaTan, Soo Fun, Azman Samsudin i Suraya Alias. "Internet of Things: Security Challenges and Its Future Direction". W 10th International Conference on Robotics, Vision, Signal Processing and Power Applications, 483–88. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6447-1_61.
Pełny tekst źródłaAbed, Amira Hassan, Mona Nasr i Basant Sayed. "The Principle Internet of Things (IoT) Security Techniques Framework Based on Seven Levels IoT’s Reference Model". W Internet of Things—Applications and Future, 219–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3075-3_15.
Pełny tekst źródłaStreszczenia konferencji na temat "Conventional security on future things"
Leventi-peetz, Anastasia-maria. "Human Machine Interaction and Security in the era of modern Machine Learning". W 9th International Conference on Human Interaction and Emerging Technologies - Artificial Intelligence and Future Applications. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002963.
Pełny tekst źródłaSodré, Y., J. Chatten i M. Liddell. "The Revolution in Marine Geo-Data Acquisition. What Does This Mean for a Future Workforce?" W Offshore Technology Conference Brasil. OTC, 2023. http://dx.doi.org/10.4043/32963-ms.
Pełny tekst źródłaKreider, Jan F., i Peter S. Curtiss. "Comprehensive Evaluation of Impacts From Potential, Future Automotive Fuel Replacements". W ASME 2007 Energy Sustainability Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/es2007-36234.
Pełny tekst źródłaHansen, Samuel, i Amin Mirkouei. "Past Infrastructures and Future Machine Intelligence (MI) for Biofuel Production: A Review and MI-Based Framework". W ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-86150.
Pełny tekst źródłaGhorbel, Roukaya, Jamel Chakchak, Hatice Basmacıoğlu Malayoğlu i Numan S. Çetin. "Hydroponics “Soilless Farming”: The Future of Food and Agriculture – A Review". W International Students Science Congress. Izmir International Guest Student Association, 2021. http://dx.doi.org/10.52460/issc.2021.007.
Pełny tekst źródłaBiermann, Hannah, Gian Luca Liehner, Ralf Philipsen i Martina Ziefle. "Autonomous shuttle or conventional cab? Investigating users’ decision to share a ride". W 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003795.
Pełny tekst źródłaLencsés, Enikő, i Kornélia Mészáros. "Challenges of Industry 4.0 in Hungarian agriculture". W The European Union’s Contention in the Reshaping Global Economy. Szeged: Szegedi Tudományegyetem Gazdaságtudományi Kar, 2022. http://dx.doi.org/10.14232/eucrge.2022.16.
Pełny tekst źródłaArora, Aman, Anureet Kaur, Bharat Bhushan i Himanshu Saini. "Security Concerns and Future Trends of Internet of Things". W 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). IEEE, 2019. http://dx.doi.org/10.1109/icicict46008.2019.8993222.
Pełny tekst źródłaRathnayaka, L. S. D., B. K. M. Nadeetharu i U. Kulatunga. "Quantity surveyor’s perspective on document management in construction projects: an exploratory study in Sri Lanka". W World Construction Symposium - 2023. Ceylon Institute of Builders - Sri Lanka, 2023. http://dx.doi.org/10.31705/wcs.2023.73.
Pełny tekst źródłaObakhena, O. F., T. G. Biambo, J. Alli-Oluwafuyi i C. Ikiliagwu. "Alpha-28 FastTrack Maturation to Execution – Securing Export Gas Supply". W SPE Nigeria Annual International Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/217168-ms.
Pełny tekst źródłaRaporty organizacyjne na temat "Conventional security on future things"
Tissot, Roger. Latin America's Energy Future. Inter-American Development Bank, grudzień 2012. http://dx.doi.org/10.18235/0006946.
Pełny tekst źródłaDavies, Will. Improving the engagement of UK armed forces overseas. Royal Institute of International Affairs, styczeń 2022. http://dx.doi.org/10.55317/9781784135010.
Pełny tekst źródłaOssoff, Will, Naz Modirzadeh i Dustin Lewis. Preparing for a Twenty-Four-Month Sprint: A Primer for Prospective and New Elected Members of the United Nations Security Council. Harvard Law School Program on International Law and Armed Conflict, grudzień 2020. http://dx.doi.org/10.54813/tzle1195.
Pełny tekst źródła