Network protocols, schemes, and mechanisms for internet of things (iot): Features, open challenges, and trends
Internet of Things (IoT) constitutes the next step in the field of technology, bringing enormous
changes in industry, medicine, environmental care, and urban development. Various …
changes in industry, medicine, environmental care, and urban development. Various …
Big data meet cyber-physical systems: A panoramic survey
The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which
are foreseen to revolutionize our world via creating new services and applications in a …
are foreseen to revolutionize our world via creating new services and applications in a …
Enabling cyber‐physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber‐security
Cyber‐physical systems (CPS) help create new services and applications by revolutionising
our world in different fields through their tight interactions and automated decisions. This is …
our world in different fields through their tight interactions and automated decisions. This is …
PARROT: Interactive privacy-aware internet of things application design tool
N Alhirabi, S Beaumont, JT Llanos… - Proceedings of the …, 2023 - dl.acm.org
Internet of Things (IoT) applications typically collect and analyse personal data that is
categorised as sensitive or special category of personal data. These data are subject to a …
categorised as sensitive or special category of personal data. These data are subject to a …
[PDF][PDF] A Survey of Anomaly Detection Approaches in Internet of Things.
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which
are connected to each other and Internet. Security plays an important role in such networks …
are connected to each other and Internet. Security plays an important role in such networks …
Knowledge discovery for enabling smart Internet of Things: A survey
The use of knowledge discovery on the Internet of Things (IoT) and its allied domains is
undeniably one of the most indispensable ones, which results in optimized placement …
undeniably one of the most indispensable ones, which results in optimized placement …
Empowering IoT developers with privacy-preserving end-user development tools
Internet of Things applications (IoT) have the potential to derive sensitive user data,
necessitating adherence to privacy and data protection laws. However, developers often …
necessitating adherence to privacy and data protection laws. However, developers often …
Interaction techniques for chord diagrams
Chord diagrams are a popular high-dimensional method for showing connections between
nodes, however they have scalability limitations and lack advanced methods for interaction …
nodes, however they have scalability limitations and lack advanced methods for interaction …
[PDF][PDF] DDoS attacks detection in the IoT using deep gaussian-bernoulli restricted boltzmann machine
Distributed denial of service (DDoS) attack is generally known as one of the most significant
threats to the internet of things (IoT). Current detection technologies of DDoS attacks are not …
threats to the internet of things (IoT). Current detection technologies of DDoS attacks are not …
Unsupervised ethical equity evaluation of adversarial federated networks
While the technology of Deep Learning (DL) is a powerful tool when properly trained for
image analysis and classification applications, some factors for its optimization rely solely on …
image analysis and classification applications, some factors for its optimization rely solely on …