Artykuły w czasopismach na temat „Conventional security on future things”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Conventional security on future things”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
U. Harita, Ms, i K. V.DayaSagar. "A survey on secured internet of things architecture". International Journal of Engineering & Technology 7, nr 2.7 (18.03.2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.
Pełny tekst źródłaAlshehri, Mohammed. "Blockchain-assisted cyber security in medical things using artificial intelligence". Electronic Research Archive 31, nr 2 (2022): 708–28. http://dx.doi.org/10.3934/era.2023035.
Pełny tekst źródłaPatil, Shamshekhar S., i Arun Biradar. "Novel authentication framework for securing communication in internet-of-things". International Journal of Electrical and Computer Engineering (IJECE) 10, nr 1 (1.02.2020): 1092. http://dx.doi.org/10.11591/ijece.v10i1.pp1092-1100.
Pełny tekst źródłaQiu, Xiaoying, Jinwei Yu, Wenying Zhuang, Guangda Li i Xuan Sun. "Channel Prediction-Based Security Authentication for Artificial Intelligence of Things". Sensors 23, nr 15 (27.07.2023): 6711. http://dx.doi.org/10.3390/s23156711.
Pełny tekst źródłaQasim, Hiba Adnan, i Rana Saad Mohammed. "Lightweight Steganography Technique in The Internet of Things: A survey". Al-Salam Journal for Engineering and Technology 3, nr 1 (18.11.2023): 97–108. http://dx.doi.org/10.55145/ajest.2024.03.01.008.
Pełny tekst źródłaDu, Qinghe, Ying Xu, Wanyu Li i Houbing Song. "Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes". Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8404219.
Pełny tekst źródłaS.P. Revathy, N. MadhiVathani, NaafiahFathima i A. MohammedIlyas. "Prediction and Prevention of Theft in Jewellery Shop". IRO Journal on Sustainable Wireless Systems 5, nr 3 (wrzesień 2023): 194–206. http://dx.doi.org/10.36548/jsws.2023.3.002.
Pełny tekst źródłaArora, Priyanka, i Ritu Makani. "Blockchain Integration with AIoT Data Security and Privacy for Sustainability". Journal of Artificial Intelligence and Systems 6, nr 1 (2024): 112–23. http://dx.doi.org/10.33969/ais.2024060108.
Pełny tekst źródłaB Kolhapuri, Sammed, Sanket V Shenvi, Sheetal R Kulkarni i Ambika Naik Y. "Survey Paper on “IoT-Driven Aquaponics for Sustainable Agriculture”". IRO Journal on Sustainable Wireless Systems 6, nr 1 (marzec 2024): 28–47. http://dx.doi.org/10.36548/jsws.2024.1.003.
Pełny tekst źródłaTok, Yen Xin, Norliza Katuk i Ahmad Suki Che Mohamed Arif. "Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone". International Journal of Interactive Mobile Technologies (iJIM) 15, nr 24 (21.12.2021): 32–48. http://dx.doi.org/10.3991/ijim.v15i24.25393.
Pełny tekst źródłaPrinsloo, Jaco, Saurabh Sinha i Basie von Solms. "A Review of Industry 4.0 Manufacturing Process Security Risks". Applied Sciences 9, nr 23 (26.11.2019): 5105. http://dx.doi.org/10.3390/app9235105.
Pełny tekst źródłaNiveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath i Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform". International Journal of e-Collaboration 17, nr 4 (październik 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.
Pełny tekst źródłaMalik, Ahmad Kamran, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh i Mohammad A. Alqarni. "From Conventional to State-of-the-Art IoT Access Control Models". Electronics 9, nr 10 (15.10.2020): 1693. http://dx.doi.org/10.3390/electronics9101693.
Pełny tekst źródłaAlkatheiri, Mohammed Saeed, i Ahmed S. Alghamdi. "Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry". Electronics 12, nr 8 (11.04.2023): 1801. http://dx.doi.org/10.3390/electronics12081801.
Pełny tekst źródłaJimmy, FNU. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, nr 1 (12.04.2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p233.
Pełny tekst źródłaJimmy, Fnu. "Cyber security Vulnerabilities and Remediation Through Cloud Security Tools". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, nr 1 (12.04.2024): 196–233. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p234.
Pełny tekst źródłaChetan, Rajani, i Ramesh Shahabadkar. "A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 4 (1.08.2018): 2319. http://dx.doi.org/10.11591/ijece.v8i4.pp2319-2326.
Pełny tekst źródłaSingh, Satyanand, Joanna Rosak-Szyrocka i László Tamàndl. "Development, Service-Oriented Architecture, and Security of Blockchain Technology for Industry 4.0 IoT Application". HighTech and Innovation Journal 4, nr 1 (1.03.2023): 134–56. http://dx.doi.org/10.28991/hij-2023-04-01-010.
Pełny tekst źródłaKim, Jiyoon, Daniel Gerbi Duguma, Sangmin Lee, Bonam Kim, JaeDeok Lim i Ilsun You. "Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches". Mobile Information Systems 2021 (13.09.2021): 1–18. http://dx.doi.org/10.1155/2021/7314508.
Pełny tekst źródłaChaudhary, Sachi, Riya Kakkar, Nilesh Kumar Jadav, Anuja Nair, Rajesh Gupta, Sudeep Tanwar, Smita Agrawal i in. "A Taxonomy on Smart Healthcare Technologies: Security Framework, Case Study, and Future Directions". Journal of Sensors 2022 (5.07.2022): 1–30. http://dx.doi.org/10.1155/2022/1863838.
Pełny tekst źródłaFalayi, Ayodeji, Qianlong Wang, Weixian Liao i Wei Yu. "Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology". Future Internet 15, nr 5 (11.05.2023): 178. http://dx.doi.org/10.3390/fi15050178.
Pełny tekst źródłaKazia, Esmeralda. "Machine learning for False Information Detection in Social Internet of Things". Fusion: Practice and Applications 10, nr 1 (2023): 38–77. http://dx.doi.org/10.54216/fpa.100103.
Pełny tekst źródłaSatamraju, Krishna Prasad, i Malarkodi B. "Proof of Concept of Scalable Integration of Internet of Things and Blockchain in Healthcare". Sensors 20, nr 5 (3.03.2020): 1389. http://dx.doi.org/10.3390/s20051389.
Pełny tekst źródła., Pratibha. "Lora Based Advanced Multipurpose Security System". International Journal for Research in Applied Science and Engineering Technology 12, nr 3 (31.03.2024): 207–14. http://dx.doi.org/10.22214/ijraset.2024.58604.
Pełny tekst źródłaAit Allal, Abdelmoula, Loubna El Amrani, Abdelfatteh Haidine, Khalifa Mansouri i Mohamed Youssfi. "Implementation of 5G Communication Network for a Safe Operation of Autonomous and Conventional Ships". International Journal of Engineering Research in Africa 51 (listopad 2020): 229–48. http://dx.doi.org/10.4028/www.scientific.net/jera.51.229.
Pełny tekst źródłaAhmed, Iqrar, Heikki Karvonen, Timo Kumpuniemi i Marcos Katz. "Wireless Communications for the Hospital of the Future: Requirements, Challenges and Solutions". International Journal of Wireless Information Networks 27, nr 1 (28.10.2019): 4–17. http://dx.doi.org/10.1007/s10776-019-00468-1.
Pełny tekst źródłaBhujel, Sangam, i Yogachandran Rahulamathavan. "A Survey: Security, Transparency, and Scalability Issues of NFT’s and Its Marketplaces". Sensors 22, nr 22 (15.11.2022): 8833. http://dx.doi.org/10.3390/s22228833.
Pełny tekst źródłaKabashkin, Igor, i Vladimir Perekrestov. "Ecosystem of Aviation Maintenance: Transition from Aircraft Health Monitoring to Health Management Based on IoT and AI Synergy". Applied Sciences 14, nr 11 (22.05.2024): 4394. http://dx.doi.org/10.3390/app14114394.
Pełny tekst źródłaSantoso, Lukman, i Tri Wahyu Surya Lestari. "Konparasi Syarat Keabsahan “Sebab Yang Halal” Dalam Perjanjian Konvensional Dan Perjanjian Syariah". Al-Istinbath : Jurnal Hukum Islam 2, nr 1 (31.07.2017): 1. http://dx.doi.org/10.29240/jhi.v2i1.152.
Pełny tekst źródłaMarinov, Val R. "Embedded Flexible Hybrid Electronics for the Internet of Things". International Symposium on Microelectronics 2015, nr 1 (1.10.2015): 000006–13. http://dx.doi.org/10.4071/isom-2015-tp12.
Pełny tekst źródłaFarooqui, Yassir, i Swpanil M. Parikh. "Secure and Transparent Supply Chain Management using Blockchain and IoT". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 11s (7.10.2023): 01–12. http://dx.doi.org/10.17762/ijritcc.v11i11s.8064.
Pełny tekst źródłaZheng, Ping, Tingting Jiang i Fachang Wang. "Research on Auxiliary Devices for English Teaching under Intelligent Internet of Things". Mobile Information Systems 2022 (26.09.2022): 1–11. http://dx.doi.org/10.1155/2022/8031846.
Pełny tekst źródłaAbdulghani, Hezam Akram, Niels Alexander Nijdam, Anastasija Collen i Dimitri Konstantas. "A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective". Symmetry 11, nr 6 (10.06.2019): 774. http://dx.doi.org/10.3390/sym11060774.
Pełny tekst źródłaLeng, Jiewu, Ziying Chen, Zhiqiang Huang, Xiaofeng Zhu, Hongye Su, Zisheng Lin i Ding Zhang. "Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions". Machines 10, nr 10 (26.09.2022): 858. http://dx.doi.org/10.3390/machines10100858.
Pełny tekst źródłaAsano, Mizuki, Takumi Miyoshi i Taku Yamazaki. "Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments". Future Internet 16, nr 1 (31.12.2023): 17. http://dx.doi.org/10.3390/fi16010017.
Pełny tekst źródłaLipps, Christoph, Annika Tjabben, Matthias Rüb, Jan Herbst, Sogo Pierre Sanon, Rekha Reddy, Yorman Munoz i Hans D. Schotten. "Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities". European Conference on Cyber Warfare and Security 22, nr 1 (19.06.2023): 267–75. http://dx.doi.org/10.34190/eccws.22.1.1207.
Pełny tekst źródłaRizwan, Ali, Dimitrios A. Karras, Jitendra Kumar, Manuel Sánchez-Chero, Marlon Martín Mogollón Taboada i Gilder Cieza Altamirano. "An Internet of Things (IoT) Based Block Chain Technology to Enhance the Quality of Supply Chain Management (SCM)". Mathematical Problems in Engineering 2022 (21.07.2022): 1–12. http://dx.doi.org/10.1155/2022/9679050.
Pełny tekst źródłaNicol, Rozenn, i Jean-Yves Monfort. "Acoustic research for telecoms: bridging the heritage to the future". Acta Acustica 7 (2023): 64. http://dx.doi.org/10.1051/aacus/2023056.
Pełny tekst źródłaAhad, Abdul, Mohammad Tahir, Muhammad Aman Sheikh, Kazi Istiaque Ahmed, Amna Mughees i Abdullah Numani. "Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review". Sensors 20, nr 14 (21.07.2020): 4047. http://dx.doi.org/10.3390/s20144047.
Pełny tekst źródłaAdebayo Olusegun Aderibigbe, Peter Efosa Ohenhen, Nwabueze Kelvin Nwaobia, Joachim Osheyor Gidiagba i Emmanuel Chigozie Ani. "ADVANCED SENSING TECHNIQUES IN ELECTRO-MECHANICAL SYSTEMS: SURVEYING THE RISE OF SMART SENSORS AND THEIR IMPLICATIONS FOR SYSTEM ROBUSTNESS". Engineering Science & Technology Journal 4, nr 6 (3.12.2023): 323–40. http://dx.doi.org/10.51594/estj.v4i6.628.
Pełny tekst źródłaPrasad, S. Rajendra, i M. Gopichand Naik. "A Review on Wind Power Forecasting Models for improved Renewable Energy Integration". International Conference on Information Science and Technology Innovation (ICoSTEC) 1, nr 1 (26.02.2022): 35–40. http://dx.doi.org/10.35842/icostec.v1i1.20.
Pełny tekst źródłaTrifunović, Darko, i Zoran Bjelica. "Cyber War - Trends and Technologies". National security and the future 21, nr 3 (1.03.2021): 65–94. http://dx.doi.org/10.37458/nstf.21.3.2.
Pełny tekst źródłaAbdull Rashid, Nur Farahin, Asma' Abu-Samah, Aishah Mohd Noh, Noor Zaim Syafiq Azam, Nur Najihah Wahid, Chee Qin Chiang, Haider Alobaidy, Nor Fadzilah Abdullah, Sawal Abdul Hamid i Rosdiadee Nordin. "DEVELOPMENT OF SMART CAMPUS APPLICATIONS BASED ON WIRELESS TECHNOLOGIES USING OPEN-SOURCE PLATFORMS". Jurnal Teknologi 84, nr 3 (31.03.2022): 173–84. http://dx.doi.org/10.11113/jurnalteknologi.v84.16732.
Pełny tekst źródłaAbdull Rashid, Nur Farahin, Asma' Abu-Samah, Aishah Mohd Noh, Noor Zaim Syafiq Azam, Nur Najihah Wahid, Chee Qin Chiang, Haider Alobaidy, Nor Fadzilah Abdullah, Sawal Abdul Hamid i Rosdiadee Nordin. "DEVELOPMENT OF SMART CAMPUS APPLICATIONS BASED ON WIRELESS TECHNOLOGIES USING OPEN-SOURCE PLATFORMS". Jurnal Teknologi 84, nr 3 (31.03.2022): 173–84. http://dx.doi.org/10.11113/jurnalteknologi.v84.16732.
Pełny tekst źródłaWang, Jiazheng, Xiuhua Fu, Rongqun Peng i Michel Kadoch. "An Innovative Infrastructure Based on Shape-Adaptive RIS for Smart Industrial IoTs". Electronics 11, nr 3 (27.01.2022): 391. http://dx.doi.org/10.3390/electronics11030391.
Pełny tekst źródłaYang, Qian, Jiaming Zhang, Junjie Zhang, Cailing Sun, Shanyi Xie, Shangdong Liu i Yimu Ji. "Graph Transformer Network Incorporating Sparse Representation for Multivariate Time Series Anomaly Detection". Electronics 13, nr 11 (23.05.2024): 2032. http://dx.doi.org/10.3390/electronics13112032.
Pełny tekst źródłaBanerjee, Indrajit, Jared Robinson, Abhishek Kashyap, Poornasha Mohabeer i Brijesh Sathian. "COVID-19 and Artificial Intelligence: the pandemic pacifier". Nepal Journal of Epidemiology 10, nr 4 (31.12.2020): 919–22. http://dx.doi.org/10.3126/nje.v10i4.33334.
Pełny tekst źródłaKaczmarczyk, Barbara, i Karolina Lis. "Perception of the Transition to a Zero-Emission Economy in the Opinion of Polish and Foreign Students: A Comparative Analysis". Energies 16, nr 18 (8.09.2023): 6486. http://dx.doi.org/10.3390/en16186486.
Pełny tekst źródłaAcquah-Andoh, Elijah, Augustine Ifelebuegu i Stephen Theophilus. "Brexit and UK Energy Security: Perspectives from Unconventional Gas Investment and the Effects of Shale Gas on UK Energy Prices". Energies 12, nr 4 (14.02.2019): 600. http://dx.doi.org/10.3390/en12040600.
Pełny tekst źródłaMizin, V. "Outlines of Strategic Stability in Global Multipolar Competition". International Trends / Mezhdunarodnye protsessy 18, nr 2 (2020): 141–68. http://dx.doi.org/10.17994/it.2020.18.2.61.8.
Pełny tekst źródła