Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Internet of Things (IoT) cybersecurity research: A review of current research topics
Y Lu, L Da Xu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
As an emerging technology, the Internet of Things (IoT) revolutionized the global network
comprising of people, smart devices, intelligent objects, data, and information. The …
comprising of people, smart devices, intelligent objects, data, and information. The …
[HTML][HTML] Cybersecurity in power grids: Challenges and opportunities
Increasing volatilities within power transmission and distribution force power grid operators
to amplify their use of communication infrastructure to monitor and control their grid. The …
to amplify their use of communication infrastructure to monitor and control their grid. The …
A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
Driven by the rapid escalation of its utilization, as well as ram** commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …
Toward a lightweight authentication and authorization framework for smart objects
JL Hernandez-Ramos, MP Pawlowski… - IEEE journal on …, 2015 - ieeexplore.ieee.org
The Internet of Things (IoT) represents the current technology revolution that is intended to
transform the current environment into a more pervasive and ubiquitous world. In this …
transform the current environment into a more pervasive and ubiquitous world. In this …
A survey of key bootstrap** protocols based on public key cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
Secure low latency communication for constrained industrial IoT scenarios
The emerging Internet of Things (IoT) promises value-added services for private and
business applications. However, especially the industrial IoT often faces tough …
business applications. However, especially the industrial IoT often faces tough …
Tailoring end-to-end IP security protocols to the Internet of Things
Recent standardization efforts focus on a number of lightweight IP security protocol variants
for end-to-end security in the Internet of Things (IoT), most notably DTLS, HIP DEX, and …
for end-to-end security in the Internet of Things (IoT), most notably DTLS, HIP DEX, and …
Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading
The rapid growth of mobile applications requires enhanced computational resources in
order to ensure better performance, security, and usability. In recent years, the proliferation …
order to ensure better performance, security, and usability. In recent years, the proliferation …
Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
S Sahraoui, A Bilami - Computer Networks, 2015 - Elsevier
Abstract The Internet of Things (IoT) is an emerging and promising paradigm that can be
considered as an extension of the Internet to interconnect all kinds of smart objects around …
considered as an extension of the Internet to interconnect all kinds of smart objects around …
LC-DEX: lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in HIP-based internet of …
B Bettoumi, R Bouallegue - Sensors, 2021 - mdpi.com
The high level of security requirements and low capabilities of constrained devices that are
connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an …
connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an …