Literatura científica selecionada sobre o tema "Conventional security on future things"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Conventional security on future things".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Conventional security on future things"
U. Harita, Ms, e K. V.DayaSagar. "A survey on secured internet of things architecture". International Journal of Engineering & Technology 7, n.º 2.7 (18 de março de 2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.
Texto completo da fonteAlshehri, Mohammed. "Blockchain-assisted cyber security in medical things using artificial intelligence". Electronic Research Archive 31, n.º 2 (2022): 708–28. http://dx.doi.org/10.3934/era.2023035.
Texto completo da fontePatil, Shamshekhar S., e Arun Biradar. "Novel authentication framework for securing communication in internet-of-things". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 1 (1 de fevereiro de 2020): 1092. http://dx.doi.org/10.11591/ijece.v10i1.pp1092-1100.
Texto completo da fonteQiu, Xiaoying, Jinwei Yu, Wenying Zhuang, Guangda Li e Xuan Sun. "Channel Prediction-Based Security Authentication for Artificial Intelligence of Things". Sensors 23, n.º 15 (27 de julho de 2023): 6711. http://dx.doi.org/10.3390/s23156711.
Texto completo da fonteQasim, Hiba Adnan, e Rana Saad Mohammed. "Lightweight Steganography Technique in The Internet of Things: A survey". Al-Salam Journal for Engineering and Technology 3, n.º 1 (18 de novembro de 2023): 97–108. http://dx.doi.org/10.55145/ajest.2024.03.01.008.
Texto completo da fonteDu, Qinghe, Ying Xu, Wanyu Li e Houbing Song. "Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes". Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8404219.
Texto completo da fonteS.P. Revathy, N. MadhiVathani, NaafiahFathima e A. MohammedIlyas. "Prediction and Prevention of Theft in Jewellery Shop". IRO Journal on Sustainable Wireless Systems 5, n.º 3 (setembro de 2023): 194–206. http://dx.doi.org/10.36548/jsws.2023.3.002.
Texto completo da fonteArora, Priyanka, e Ritu Makani. "Blockchain Integration with AIoT Data Security and Privacy for Sustainability". Journal of Artificial Intelligence and Systems 6, n.º 1 (2024): 112–23. http://dx.doi.org/10.33969/ais.2024060108.
Texto completo da fonteB Kolhapuri, Sammed, Sanket V Shenvi, Sheetal R Kulkarni e Ambika Naik Y. "Survey Paper on “IoT-Driven Aquaponics for Sustainable Agriculture”". IRO Journal on Sustainable Wireless Systems 6, n.º 1 (março de 2024): 28–47. http://dx.doi.org/10.36548/jsws.2024.1.003.
Texto completo da fonteTok, Yen Xin, Norliza Katuk e Ahmad Suki Che Mohamed Arif. "Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone". International Journal of Interactive Mobile Technologies (iJIM) 15, n.º 24 (21 de dezembro de 2021): 32–48. http://dx.doi.org/10.3991/ijim.v15i24.25393.
Texto completo da fonteTeses / dissertações sobre o assunto "Conventional security on future things"
Kao, Wiyao. "Le contrat portant sur une chose future : essai d’une théorie générale". Electronic Thesis or Diss., Poitiers, 2020. http://www.theses.fr/2020POIT3015.
Texto completo da fonteThe expression "contract relating to a future thing" means that the contracting parties may validly stipulate that the thing due will be future; they may thus contract on a tangible or intangible thing that does not yet exist, at least in its entirety. Since the Roman sale of a future thing, contracts relating to a future thing have diversified. The practice of these contracts has become commonplace because of their economic importance. Taking the measure of this diversity and richness, reflection on the contract for a future thing has been considered under the heading of general theory. Contracts relating to a future thing are familiar figures without necessarily being noticed. It was necessary to identify them first of all. What characterizes them, and what is quickly apparent, is that each of these contracts presupposes a future thing which constitutes their object; this study proposes a clear and distinct definition of them. What is perhaps less obvious from an analysis of these contracts, and yet characteristic of them, is that they are always commutative contracts and not random contracts. This feature shows that the Roman theory of the sale of a future thing, as it has always been presented, must be used today with great care to explain the whole mechanism of the contract for a future thing. The identification of the contract relating to a future thing continued with a reference to anticipation. This is a doctrinal explanation of former article 1130, paragraph 1, of the Civil Code, which provided: "The subject-matter of an obligation may be a future thing". It explains even today, after the reform of the law of contract, the new article 1163, paragraph 1. These three references or criteria (the future thing, the absence of contingency and anticipation) have made it possible to identify, on the one hand, special contracts relating to a future thing and, on the other hand, contractual securities relating to a future thing. Once the various contracts relating to a future thing had been identified, it was important to study their legal regime in a second stage. A contract relating to a future thing is distinguished by two common and specific rules: first, the debtor is under a prior obligation to do something which consists in making the promised thing happen by participating in its creation or by executing another contract; and second, the creditor has a possible right, which is the pure and simple right in germ, in favour of the creditor. Moreover, most of the developments on the validity and non-performance of a contract relating to a future thing fall under the general law of contract. The problems discussed did not make it possible to identify any specific features relating to the aspect of the future thing, the object of the service.In terms of the concept and the regime, there are a total of five common criteria and rules on which to base a general theory of the contract relating to a thing in the future
Aqeel, Muhammad. "Internet of Things : Systematic literature review of security and future research". Thesis, Uppsala universitet, Informationssystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420118.
Texto completo da fonteBude, Cristian, e Bergstrand Andreas Kervefors. "Internet of Things : Exploring and Securing a Future Concept". Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.
Texto completo da fonteInternet of Things (IoT) är ett koncept som omfattar olika objekt och kommunikationsmetoder för utbyte av information. Idag är IoT mer en beskrivande term av den framtidsvision som finns att allting ska vara uppkopplat på internet. IoT kommer vara fundamentalt i framtiden eftersom konceptet öppnar upp möjligheter för nya tjänster samt nya innovationer. Då alla objekt ska vara uppkopplade och kunna kommunicera med varandra samtidigt som de skall kunna operera i oskyddade miljöer, bidrar detta till stora säkerhetsutmaningar. Dagens IoT är i stort behov av standardisering och klara strukturer för hur tekniken ska implementeras samt samverka med varandra på ett säkert sätt. Utmaningarna ligger i att säkra tekniken samt informationen som tekinken bidrar med. Denna rapport ger en introduktion till vad IoT är och hur det kan användas samt vilka hot som IoT kan möta i avseende till informationssäkerhet. Utöver detta så förser rapporten läsaren med förslag om hur man eventuellt kan lösa de fundamentala behoven av autentisering och säker kommunikation. Lösningarna som läggs fram är baserade på både nutida lösningar och teknik som är under utveckling inför framtiden. Nutida lösningar är baserade på säkerhetsprotokoll som IPsec och DTLS som används i en miljö som sträcker över internet och in i ett 6LoWPAN nätverk. Den autentiseringslösning som tagits fram grundar sig på PKI och förtroendemodeller för certifikathantering. För framtida arbete presenteras flertalet vidare fördjupningsområden där denna rapport kan användas som grund. Dessa fördjupningsområden inkluderar vidare analys av sårbarheter och implementation av de lösningar som tagits fram.
DUSHKU, EDLIRA. "Remote attestation to ensure the security of future Internet of Things services". Doctoral thesis, 2020. http://hdl.handle.net/11573/1382715.
Texto completo da fonteLivros sobre o assunto "Conventional security on future things"
Sloan, Stanley R. Conventional arms control and Europe's future. New York, N.Y: Foreign Policy Association, 1989.
Encontre o texto completo da fonteA, Millen Raymond, e Army War College (U.S.). Strategic Studies Institute., eds. Future war, future battlespace: The strategic role of American landpower. [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2003.
Encontre o texto completo da fonteBonen, Zeev. Advanced technology and future warfare. Ramat Gan, Israel: BESA Center, Bar-Ilan University, 1996.
Encontre o texto completo da fonteUnited States. Government Accountability Office. Operation Iraqi Freedom: DOD should apply lessons learned concerning the need for security over conventional munitions storage sites to future operations planning : report to congressional committees. [Washington, D.C.]: United States Government Accountability Office, 2007.
Encontre o texto completo da fonteGrauer, Ryan. Conventional Interstate Warfare. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0027.
Texto completo da fonteNatalie, Klein. 26 Maritime Security. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198715481.003.0026.
Texto completo da fonteWong, Wilson W. S. Emerging Military Technologies. ABC-CLIO, LLC, 2013. http://dx.doi.org/10.5040/9798400645068.
Texto completo da fonteClark, Robert, Raimond Maurer e Olivia S. Mitchell. How Persistent Low Returns Will Shape Saving and Retirement. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198827443.003.0001.
Texto completo da fonteSatpathy, Suneeta, Sachi Nandan Mohanty, Tanupriya Choudhury, Subhendu Kumar Pani e Bhagirathi Nayak. Wireless Sensor Networks and the Internet of Things: Future Directions and Applications. Apple Academic Press, Incorporated, 2021.
Encontre o texto completo da fonteSatpathy, Suneeta, Sachi Nandan Mohanty, Tanupriya Choudhury, Subhendu Kumar Pani e Bhagirathi Nayak. Wireless Sensor Networks and the Internet of Things: Future Directions and Applications. Apple Academic Press, Incorporated, 2021.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Conventional security on future things"
Maheshwary, Priti, e Timothy Malche. "Safeguarding the Connected Future: Security in Internet of Things (IoT)". In Internet of Things Security, 55–86. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338642-4.
Texto completo da fonteMinh, Quang Tran, Phat Nguyen Huu, Takeshi Tsuchiya e Michel Toulouse. "Openness in Fog Computing for the Internet of Things". In Future Data and Security Engineering, 343–57. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_23.
Texto completo da fonteAgarwal, Puja, Anjana Mishra e Brojo Kishore Mishra. "The Future Security Solution to the Internet of Things: Biometric Technology". In Internet of Things, 163–74. New York: Apple Academic Press, 2023. http://dx.doi.org/10.1201/9781003304609-9.
Texto completo da fonteArévalo, Rodrigo Alexander Fagua, Octavio José Salcedo Parra e Juan Manuel Sánchez Céspedes. "Security for the Internet of Things and the Bluetooth Protocol". In Future Data and Security Engineering, 74–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03192-3_7.
Texto completo da fonteHamad, Salma Abdalla, Quan Z. Sheng e Wei Emma Zhang. "Conclusion and Future Directions". In Security Framework for The Internet of Things Applications, 102–8. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003478683-6.
Texto completo da fonteTôn, Long-Phuoc, Lam-Son Lê e Hoang-Anh Pham. "Towards a Domain Specific Framework for Wearable Applications in Internet of Things". In Future Data and Security Engineering, 309–24. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70004-5_22.
Texto completo da fonteQureshi, Kashif Naseer, Thomas Newe, Rosheen Qazi e Gwanggil Jeon. "Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends". In Internet of Things, 291–306. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33808-3_16.
Texto completo da fonteSrivastava, Gautam, Reza M. Parizi e Ali Dehghantanha. "The Future of Blockchain Technology in Healthcare Internet of Things Security". In Advances in Information Security, 161–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3_9.
Texto completo da fonteTan, Soo Fun, Azman Samsudin e Suraya Alias. "Internet of Things: Security Challenges and Its Future Direction". In 10th International Conference on Robotics, Vision, Signal Processing and Power Applications, 483–88. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6447-1_61.
Texto completo da fonteAbed, Amira Hassan, Mona Nasr e Basant Sayed. "The Principle Internet of Things (IoT) Security Techniques Framework Based on Seven Levels IoT’s Reference Model". In Internet of Things—Applications and Future, 219–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3075-3_15.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Conventional security on future things"
Leventi-peetz, Anastasia-maria. "Human Machine Interaction and Security in the era of modern Machine Learning". In 9th International Conference on Human Interaction and Emerging Technologies - Artificial Intelligence and Future Applications. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002963.
Texto completo da fonteSodré, Y., J. Chatten e M. Liddell. "The Revolution in Marine Geo-Data Acquisition. What Does This Mean for a Future Workforce?" In Offshore Technology Conference Brasil. OTC, 2023. http://dx.doi.org/10.4043/32963-ms.
Texto completo da fonteKreider, Jan F., e Peter S. Curtiss. "Comprehensive Evaluation of Impacts From Potential, Future Automotive Fuel Replacements". In ASME 2007 Energy Sustainability Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/es2007-36234.
Texto completo da fonteHansen, Samuel, e Amin Mirkouei. "Past Infrastructures and Future Machine Intelligence (MI) for Biofuel Production: A Review and MI-Based Framework". In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-86150.
Texto completo da fonteGhorbel, Roukaya, Jamel Chakchak, Hatice Basmacıoğlu Malayoğlu e Numan S. Çetin. "Hydroponics “Soilless Farming”: The Future of Food and Agriculture – A Review". In International Students Science Congress. Izmir International Guest Student Association, 2021. http://dx.doi.org/10.52460/issc.2021.007.
Texto completo da fonteBiermann, Hannah, Gian Luca Liehner, Ralf Philipsen e Martina Ziefle. "Autonomous shuttle or conventional cab? Investigating users’ decision to share a ride". In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003795.
Texto completo da fonteLencsés, Enikő, e Kornélia Mészáros. "Challenges of Industry 4.0 in Hungarian agriculture". In The European Union’s Contention in the Reshaping Global Economy. Szeged: Szegedi Tudományegyetem Gazdaságtudományi Kar, 2022. http://dx.doi.org/10.14232/eucrge.2022.16.
Texto completo da fonteArora, Aman, Anureet Kaur, Bharat Bhushan e Himanshu Saini. "Security Concerns and Future Trends of Internet of Things". In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). IEEE, 2019. http://dx.doi.org/10.1109/icicict46008.2019.8993222.
Texto completo da fonteRathnayaka, L. S. D., B. K. M. Nadeetharu e U. Kulatunga. "Quantity surveyor’s perspective on document management in construction projects: an exploratory study in Sri Lanka". In World Construction Symposium - 2023. Ceylon Institute of Builders - Sri Lanka, 2023. http://dx.doi.org/10.31705/wcs.2023.73.
Texto completo da fonteObakhena, O. F., T. G. Biambo, J. Alli-Oluwafuyi e C. Ikiliagwu. "Alpha-28 FastTrack Maturation to Execution – Securing Export Gas Supply". In SPE Nigeria Annual International Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/217168-ms.
Texto completo da fonteRelatórios de organizações sobre o assunto "Conventional security on future things"
Tissot, Roger. Latin America's Energy Future. Inter-American Development Bank, dezembro de 2012. http://dx.doi.org/10.18235/0006946.
Texto completo da fonteDavies, Will. Improving the engagement of UK armed forces overseas. Royal Institute of International Affairs, janeiro de 2022. http://dx.doi.org/10.55317/9781784135010.
Texto completo da fonteOssoff, Will, Naz Modirzadeh e Dustin Lewis. Preparing for a Twenty-Four-Month Sprint: A Primer for Prospective and New Elected Members of the United Nations Security Council. Harvard Law School Program on International Law and Armed Conflict, dezembro de 2020. http://dx.doi.org/10.54813/tzle1195.
Texto completo da fonte