Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] IoT: Communication protocols and security threats
In this study, we review the fundamentals of IoT architecture and we thoroughly present the
communication protocols that have been invented especially for IoT technology. Moreover …
communication protocols that have been invented especially for IoT technology. Moreover …
Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
A signature-based intrusion detection system for the internet of things
Internet of Things (IoT) is envisioned as a transformative approach with a wide range of
applications in various sectors such as home automation, industrial control, and agriculture …
applications in various sectors such as home automation, industrial control, and agriculture …
Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach
F Azzedin - IEEE Access, 2023 - ieeexplore.ieee.org
In domains such as telehealth, intelligent transportation, and autonomous agriculture,
ensuring secure routing of collected and exchanged data is paramount. Since its inception …
ensuring secure routing of collected and exchanged data is paramount. Since its inception …
[HTML][HTML] An intrusion detection system for RPL-based IoT networks
E Garcia Ribera, B Martinez Alvarez, C Samuel… - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) has become very popular during the last decade by providing
new solutions to modern industry and to entire societies. At the same time, the rise of the …
new solutions to modern industry and to entire societies. At the same time, the rise of the …
Denial-of-service attacks and countermeasures in the RPL-based Internet of Things
Abstract Internet of Things (IoT) is already playing a significant role in our lives, as more and
more industries are adopting IoT for improving existing systems and providing novel …
more industries are adopting IoT for improving existing systems and providing novel …
[HTML][HTML] On the efficiency of a lightweight authentication and privacy preservation scheme for MQTT
S Tian, VG Vassilakis - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) deployment in emerging markets has increased dramatically,
making security a prominent issue in IoT communication. Several protocols are available for …
making security a prominent issue in IoT communication. Several protocols are available for …
Secure and efficient parameters aggregation protocol for federated incremental learning and its applications
X Wang, Z Liang, ASV Koe, Q Wu… - … Journal of Intelligent …, 2022 - Wiley Online Library
Federated Learning (FL) enables the deployment of distributed machine learning models
over the cloud and Edge Devices (EDs) while preserving the privacy of sensitive local data …
over the cloud and Edge Devices (EDs) while preserving the privacy of sensitive local data …
A survey on secure group communication schemes with focus on iot communication
A key feature for Internet of Things (IoT) is to control what content is available to each user.
To handle this access management, encryption schemes can be used. Due to the diverse …
To handle this access management, encryption schemes can be used. Due to the diverse …
Battery drain denial-of-service attacks and defenses in the Internet of Things
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a popular routing
protocol used in wireless sensor networks and in the Internet of Things (IoT). RPL was …
protocol used in wireless sensor networks and in the Internet of Things (IoT). RPL was …