A systematic review of crime facilitated by the consumer Internet of Things

JM Blythe, SD Johnson - Security Journal, 2021 - Springer
The nature of crime is changing—estimates suggest that at least half of all crime is now
committed online. Once everyday objects (eg televisions, baby monitors, door locks) that are …

Systematic literature review on the use of trusted execution environments to protect cloud/fog-based internet of things applications

DCG Valadares, NC Will, J Caminha… - IEEE …, 2021 - ieeexplore.ieee.org
Trusted Execution Environments have been applied to improve data security in many distinct
application scenarios since they enable data processing in a separate and protected region …

Identifying vulnerabilities in security and privacy of smart home devices

C Chhetri, V Motti - National Cyber Summit (NCS) Research Track 2020, 2021 - Springer
Abstract Smart Home Devices (SHDs) offer convenience that comes at the cost of security
and privacy. SHDs can be subject to attacks and they can be used to conduct attacks on …

Multimedia security and privacy protection in the internet of things: research developments and challenges

W Yang, S Wang, J HuHu… - International Journal of …, 2022 - inderscienceonline.com
With the rapid growth of the internet of things (IoT), huge amounts of multimedia data are
being generated from and/or exchanged through various IoT devices, systems and …

[Књига][B] Designing for Privacy in Smart Home Devices

C Chhetri - 2022 - search.proquest.com
One-sixth of the 20 billion Internet of Things (IoT) devices connecting to the Internet are
smart home devices (SHD) that provide home automation. These SHDs present privacy and …

Runtime hardware security verification using approximate computing: A case study on video motion detection

M Ye, X Feng, S Wei - 2019 Asian Hardware Oriented Security …, 2019 - ieeexplore.ieee.org
The heterogeneous CPU-FPGA system architecture has been adopted in system-on-chip
(SoC), server, and cloud computing platforms to achieve design flexibility and hardware …

Towards automated surveillance: a review of intelligent video surveillance

R Vijeikis, V Raudonis, G Dervinis - Intelligent Computing: Proceedings of …, 2021 - Springer
The latest popularity of computer vision, artificial intelligence, and connectivity between the
systems and processes made a solid ground for the development of intelligent video …

An Exploration of Human Pose Estimation Based Cheating Tools for FPS Video Game and its Defense Solution

C Liu, Z Gao, Z Liao, Y Sun… - 2024 IEEE 26th …, 2024 - ieeexplore.ieee.org
Modern computer vision and AI algorithms have become highly effective in analyzing high-
dimensional image and video content for various tasks. Recently, some have exploited the …

Automatic Recognition for IoT Supervision Images Based on Modal Decomposition.

Y Wang, Y Wang, S Zhang, S Lin… - Traitement du …, 2022 - search.ebscohost.com
The automatic recognition for Internet of Things (IoT) supervision images is a prerequisite for
the detection of abnormalities in monitoring images. This technology is a developmental …

Real time image encoding for fast IOT (internet of things) based video vigilance system

AA Siddique, Z Mohy-Ud-Din, MT Qadri - Wireless personal …, 2020 - Springer
In recent times, technology has played an important role in almost every field as it advances.
Law and order situation in the third world countries are extensively poor, and it is imperative …