Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Fasten iiot: An open real-time platform for vertical, horizontal and end-to-end integration
FS Costa, SM Nassar, S Gusmeroli, R Schultz… - Sensors, 2020 - mdpi.com
The Industry 4.0 paradigm, since its initial conception in Germany in 2011, has extended its
scope and adoption to a broader set of technologies. It is being considered as the most vital …
scope and adoption to a broader set of technologies. It is being considered as the most vital …
Self-adaptive and secure mechanism for IoT based multimedia services: a survey
With the advent of internet of things (IoT) and IoT multimedia services in real-time
applications, including smart healthcare, smart home, and smart connected transportation …
applications, including smart healthcare, smart home, and smart connected transportation …
[PDF][PDF] Context-aware authentication for the internet of things
Many traditional authentication and access control mechanisms do not use context-aware
approach, ie, those mechanisms do not incorporate context parameters while making …
approach, ie, those mechanisms do not incorporate context parameters while making …
Providing context-aware security for IoT environments through context sharing feature
Nowadays security and privacy in Internet of Things (IoT) environments is a real issue.
Traditional security mechanisms use a non-aware approach, in which static parameters are …
Traditional security mechanisms use a non-aware approach, in which static parameters are …
Context-aware security in the internet of things: a review
Security and privacy are hot topics when considering the Internet of Things (IoT) application
scenarios. By dealing with sensitive and sometimes personal data, IoT application …
scenarios. By dealing with sensitive and sometimes personal data, IoT application …
[PDF][PDF] Adaptive security schemes based on context and trust for ubiquitous computing environment: A comprehensive survey
Objectives: To present the principle of working of some of the widely used adaptive security
schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main …
schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main …
Context-aware security in the internet of things: a survey
Internet of things (IoT) applications encompass home-automation, health, transportation, etc.
The main objective of these applications is to improve user's lives. However, security and …
The main objective of these applications is to improve user's lives. However, security and …
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security
policies. Also, new sensing technologies in pervasive computing make it possible to define …
policies. Also, new sensing technologies in pervasive computing make it possible to define …
A trust-based secure service discovery (TSSD) model for pervasive computing
To cope with the challenges posed by device capacity and capability, and also the nature of
ad hoc networks, a Service discovery model is needed that can resolve security and privacy …
ad hoc networks, a Service discovery model is needed that can resolve security and privacy …
Context-Aware Security in the Internet of Things: What We Know and Where We are Going
AI Alotaibi, A Oracevic - 2023 International Symposium on …, 2023 - ieeexplore.ieee.org
Context awareness has been on the grow for the last couple of years and part of the reason
for the emergence of this technology is the nature and dynamic of the Internet of Things (IoT) …
for the emergence of this technology is the nature and dynamic of the Internet of Things (IoT) …