Статті в журналах з теми "Security devices"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security devices".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Al Reshan, Mana Saleh. "IoT-based Application of Information Security Triad." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 61–76. http://dx.doi.org/10.3991/ijim.v15i24.27333.
Повний текст джерелаKroleski, Steven L., and William A. Bottiglieri. "Leases As Security Devices." Journal of Business Case Studies (JBCS) 4, no. 4 (June 28, 2011): 45. http://dx.doi.org/10.19030/jbcs.v4i4.4775.
Повний текст джерелаChoudhary, Yash, B. Umamaheswari, and Vijeta Kumawat. "A Study of Threats, Vulnerabilities and Countermeasures: An IoT Perspective." Shanlax International Journal of Arts, Science and Humanities 8, no. 4 (April 1, 2021): 39–45. http://dx.doi.org/10.34293/sijash.v8i4.3583.
Повний текст джерелаZhu, Li Jue, Wen Tao Zhao, Hui Jun Wu, Yong Liu, and Zhao Ming Hu. "Prototype Design of Self-Securing Portable Storage Device." Applied Mechanics and Materials 347-350 (August 2013): 3911–14. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3911.
Повний текст джерелаKurt Peker, Yeṣem, Gabriel Bello, and Alfredo J. Perez. "On the Security of Bluetooth Low Energy in Two Consumer Wearable Heart Rate Monitors/Sensing Devices." Sensors 22, no. 3 (January 27, 2022): 988. http://dx.doi.org/10.3390/s22030988.
Повний текст джерелаMyridakis, Dimitrios, Georgios Spathoulas, Athanasios Kakarountas, and Dimitrios Schinianakis. "Smart Devices Security Enhancement via Power Supply Monitoring." Future Internet 12, no. 3 (March 10, 2020): 48. http://dx.doi.org/10.3390/fi12030048.
Повний текст джерелаKaushal, Rajesh Kumar, Naveen Kumar, Shilpi Singhal, Simranjeet Singh, and Harmaninderjit Singh. "Locking Device for Physical Protection of Electronic Devices." ECS Transactions 107, no. 1 (April 24, 2022): 1769–79. http://dx.doi.org/10.1149/10701.1769ecst.
Повний текст джерелаSharma, Amritesh Kumar, Arun Kumar Singh, and Pankaj P. Singh. "Security in Android." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 10 (April 25, 2014): 3990–96. http://dx.doi.org/10.24297/ijct.v12i10.2983.
Повний текст джерелаAlamer, A., and B. Soh. "FEATHER: A Proposed Lightweight Protocol for Mobile Cloud Computing Security." Engineering, Technology & Applied Science Research 10, no. 4 (August 16, 2020): 6116–25. http://dx.doi.org/10.48084/etasr.3676.
Повний текст джерелаA. Harris, Mark, and Karen P. Patten. "Mobile device security considerations for small- and medium-sized enterprise business mobility." Information Management & Computer Security 22, no. 1 (March 4, 2014): 97–114. http://dx.doi.org/10.1108/imcs-03-2013-0019.
Повний текст джерелаFoley, Patricia G., Kathleen Hargiss, Caroline Howard, and Anne Pesanvento. "Security Measures in IoT Devices, Including Wireless Medical Devices." International Journal of Cyber-Physical Systems 3, no. 1 (January 1, 2021): 25–36. http://dx.doi.org/10.4018/ijcps.2021010102.
Повний текст джерелаMtetwa, Njabulo Sakhile, Paul Tarwireyi, Cecilia Nombuso Sibeko, Adnan Abu-Mahfouz, and Matthew Adigun. "Blockchain-Based Security Model for LoRaWAN Firmware Updates." Journal of Sensor and Actuator Networks 11, no. 1 (January 7, 2022): 5. http://dx.doi.org/10.3390/jsan11010005.
Повний текст джерелаBuenrostro, Erick, Daniel Cyrus, Tra Le, and Vahid Emamian. "Security of IoT Devices." Journal of Cyber Security Technology 2, no. 1 (January 2, 2018): 1–13. http://dx.doi.org/10.1080/23742917.2018.1474592.
Повний текст джерелаGoto, Ren, Taiki Yoshikawa, Hijiri Komura, Kazushige Matama, Chihiro Nishiwaki, and Katsuhiro Naito. "Design and Basic Evaluation of Virtual IPv4-based CYPHONIC adapter." Journal of Systemics, Cybernetics and Informatics 20, no. 3 (June 2022): 55–63. http://dx.doi.org/10.54808/jsci.20.03.55.
Повний текст джерелаAlam, Tanweer, and Mohamed Benaida. "CICS: Cloud–Internet Communication Security Framework for the Internet of Smart Devices." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 6 (October 29, 2018): 74. http://dx.doi.org/10.3991/ijim.v12i6.6776.
Повний текст джерелаZhu, Ruijin, Baofeng Zhang, Yu-an Tan, Jinmiao Wang, and Yueliang Wan. "Determining the Image Base of Smart Device Firmware for Security Analysis." Wireless Communications and Mobile Computing 2020 (December 22, 2020): 1–12. http://dx.doi.org/10.1155/2020/8899193.
Повний текст джерелаLima, António, Luis Rosa, Tiago Cruz, and Paulo Simões. "A Security Monitoring Framework for Mobile Devices." Electronics 9, no. 8 (July 25, 2020): 1197. http://dx.doi.org/10.3390/electronics9081197.
Повний текст джерелаSingh, Anuj Kumar, and B. D. K. Patro. "Security of Low Computing Power Devices: A Survey of Requirements, Challenges & Possible Solutions." Cybernetics and Information Technologies 19, no. 1 (March 1, 2019): 133–64. http://dx.doi.org/10.2478/cait-2019-0008.
Повний текст джерелаNemec Zlatolas, Lili, Nataša Feher, and Marko Hölbl. "Security Perception of IoT Devices in Smart Homes." Journal of Cybersecurity and Privacy 2, no. 1 (February 14, 2022): 65–74. http://dx.doi.org/10.3390/jcp2010005.
Повний текст джерелаJiang, Dawei, and Guoquan Shi. "Research on Data Security and Privacy Protection of Wearable Equipment in Healthcare." Journal of Healthcare Engineering 2021 (February 5, 2021): 1–7. http://dx.doi.org/10.1155/2021/6656204.
Повний текст джерелаAl_Dosary, Duaa, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "ICMetric Security System for Achieving Embedded Devices Security." Journal of Physics: Conference Series 1804, no. 1 (February 1, 2021): 012102. http://dx.doi.org/10.1088/1742-6596/1804/1/012102.
Повний текст джерелаMatheu, Sara N., Alberto Robles Enciso, Alejandro Molina Zarca, Dan Garcia-Carrillo, José Luis Hernández-Ramos, Jorge Bernal Bernabe, and Antonio F. Skarmeta. "Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems." Sensors 20, no. 7 (March 28, 2020): 1882. http://dx.doi.org/10.3390/s20071882.
Повний текст джерелаWang, Lei, Yalong Li, Xinyuan Tian, and Deyun Mo. "A design of the lightweight key management system for multi-level embedded devices." Applied Mathematics and Nonlinear Sciences 7, no. 2 (July 1, 2022): 1093–104. http://dx.doi.org/10.2478/amns.2021.2.00319.
Повний текст джерелаToka, K. O., Y. Dikilitaş, T. Oktay, and A. Sayar. "SECURING IOT WITH BLOCKCHAIN." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 529–32. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-529-2021.
Повний текст джерелаSinda, Matt, Tyler Danner, Sean O'Neill, Abeer Alqurashi, and Haeng-Kon Kim. "Improving the Bluetooth Hopping Sequence for Better Security in IoT Devices." International Journal of Software Innovation 6, no. 4 (October 2018): 117–31. http://dx.doi.org/10.4018/ijsi.2018100109.
Повний текст джерелаChang, Milton, Santanu Das, Dale Montrone, and Tapan Chakraborty. "Systems for Implementing Data Communication with Security Tokens." International Journal of High Speed Electronics and Systems 29, no. 01n04 (March 2020): 2040012. http://dx.doi.org/10.1142/s0129156420400121.
Повний текст джерелаM G, Padmashree, Mallikarjun J P, Arunalatha J S, and Venugopal K R. "MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet of Things." International journal of Computer Networks & Communications 13, no. 6 (September 30, 2021): 19–39. http://dx.doi.org/10.5121/ijcnc.2021.13602.
Повний текст джерелаOser, Pascal, Rens W. van der Heijden, Stefan Lüders, and Frank Kargl. "Risk Prediction of IoT Devices Based on Vulnerability Analysis." ACM Transactions on Privacy and Security 25, no. 2 (May 31, 2022): 1–36. http://dx.doi.org/10.1145/3510360.
Повний текст джерелаZeng, Wen Ying, and Yue Long Zhao. "Mobile Storage and Data Security Management Research." Applied Mechanics and Materials 325-326 (June 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1661.
Повний текст джерелаThoutam, Vivek. "Unique Security Challenges of Iot Devices and Spectrum of Security Considerations." International Journal of Information technology and Computer Engineering, no. 11 (September 30, 2021): 15–21. http://dx.doi.org/10.55529/ijitc.11.15.21.
Повний текст джерелаThoutam, Vivek. "Unique Security Challenges Of Iot Devices And Spectrum Of Security Considerations." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 12 (November 12, 2021): 1–7. http://dx.doi.org/10.55529/jaimlnn.12.1.7.
Повний текст джерелаChiasson, Sonia, Heather Crawford, Serge Egelman, and Pourang Irani. "Reflections on U-PriSM 2." International Journal of Mobile Human Computer Interaction 6, no. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.
Повний текст джерелаKodati, Sarangam, Kumbala Pradeep Reddy, Thotakura Veerananna, S. Govinda Rao, and G. Anil Kumar. "Security Framework Connection Assistance for IoT Device Secure Data communication." E3S Web of Conferences 309 (2021): 01061. http://dx.doi.org/10.1051/e3sconf/202130901061.
Повний текст джерелаWakabayashi, Kiyoshi, Hiroyuki Kikuchi, Toshihiro Mori, Takamitsu Okada, and Yoshiro Koyama. "Safety Devices for Security Robots." Journal of the Robotics Society of Japan 29, no. 9 (2011): 777–79. http://dx.doi.org/10.7210/jrsj.29.777.
Повний текст джерелаHarthorne, J. Warren. "Pacemakers and Store Security Devices." Cardiology in Review 9, no. 1 (January 2001): 10–17. http://dx.doi.org/10.1097/00045415-200101000-00004.
Повний текст джерелаP.Musale, Vinayak, and S. S. Apte. "Security Risks in Bluetooth Devices." International Journal of Computer Applications 51, no. 1 (August 30, 2012): 1–6. http://dx.doi.org/10.5120/8003-1308.
Повний текст джерелаSametinger, Johannes, Jerzy Rozenblit, Roman Lysecky, and Peter Ott. "Security challenges for medical devices." Communications of the ACM 58, no. 4 (March 23, 2015): 74–82. http://dx.doi.org/10.1145/2667218.
Повний текст джерелаNeves, Ulysses Moreira, and Flávio Luis de Mello. "BYOD with Security." Journal of Information Security and Cryptography (Enigma) 5, no. 1 (January 27, 2019): 40. http://dx.doi.org/10.17648/jisc.v5i1.70.
Повний текст джерелаNtwari, Richard, Annabella E. Habinka, and Fred Kaggwa. "Enhancing Bring Your Own Device Security in Education." Journal of Science & Technology 02, no. 04 (2021): 69–86. http://dx.doi.org/10.55662/jst.2021.2401.
Повний текст джерелаJ G, Krithick, Nivedh T S, Siva Bharath S, Dr Radhamani A. S, and V. Ramanathan. "DATA SECURITY IN HEALTHCARE USING IOT." International Journal of Engineering Applied Sciences and Technology 7, no. 3 (July 1, 2022): 79–82. http://dx.doi.org/10.33564/ijeast.2022.v07i03.011.
Повний текст джерелаHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Повний текст джерелаSu, Xin, Ziyu Wang, Xiaofeng Liu, Chang Choi, and Dongmin Choi. "Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures." Security and Communication Networks 2018 (May 31, 2018): 1–14. http://dx.doi.org/10.1155/2018/4296934.
Повний текст джерелаKim, Jiyeon, Minsun Shim, Seungah Hong, Yulim Shin, and Eunjung Choi. "Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning." Applied Sciences 10, no. 19 (October 8, 2020): 7009. http://dx.doi.org/10.3390/app10197009.
Повний текст джерелаWang, Jin, Chang Liu, Jiangpei Xu, Juan Wang, Shirong Hao, Wenzhe Yi, and Jing Zhong. "IoT-DeepSense: Behavioral Security Detection of IoT Devices Based on Firmware Virtualization and Deep Learning." Security and Communication Networks 2022 (March 18, 2022): 1–17. http://dx.doi.org/10.1155/2022/1443978.
Повний текст джерелаChoi, Ye-Jin, Hee-Jung Kang, and Il-Gu Lee. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7 (July 3, 2019): 752. http://dx.doi.org/10.3390/electronics8070752.
Повний текст джерелаZendehdel, Ghazale Amel, Ratinder Kaur, Inderpreet Chopra, Natalia Stakhanova, and Erik Scheme. "Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices." ACM Transactions on Internet Technology 22, no. 1 (February 28, 2022): 1–31. http://dx.doi.org/10.1145/3448649.
Повний текст джерелаLopes, Ana Paula G., and Paulo R. L. Gondim. "Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation." Wireless Communications and Mobile Computing 2020 (October 27, 2020): 1–16. http://dx.doi.org/10.1155/2020/8876807.
Повний текст джерелаRajendran, Jeyavijayan, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki. "Nano Meets Security: Exploring Nanoelectronic Devices for Security Applications." Proceedings of the IEEE 103, no. 5 (May 2015): 829–49. http://dx.doi.org/10.1109/jproc.2014.2387353.
Повний текст джерелаDutta-Roy, Amitava. "Nano meets security: Exploring nanoelectronic devices for security applications." Proceedings of the IEEE 103, no. 5 (May 2015): 822–28. http://dx.doi.org/10.1109/jproc.2015.2418512.
Повний текст джерелаSolera-Cotanilla, Sonia, Mario Vega-Barbas, Jaime Pérez, Gregorio López, Javier Matanza, and Manuel Álvarez-Campana. "Security and Privacy Analysis of Youth-Oriented Connected Devices." Sensors 22, no. 11 (May 24, 2022): 3967. http://dx.doi.org/10.3390/s22113967.
Повний текст джерела