Smart home security: challenges, issues and solutions at different IoT layers
Abstract The Internet of Things is a rapidly evolving technology in which interconnected
computing devices and sensors share data over the network to decipher different problems …
computing devices and sensors share data over the network to decipher different problems …
A survey of software clone detection from security perspective
H Zhang, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
For software engineering, if two code fragments are closely similar with minor modifications
or even identical due to a copy-paste behavior, that is called software/code clone. Code …
or even identical due to a copy-paste behavior, that is called software/code clone. Code …
Proof of delivery smart contract for performance measurements
The growth of the enterprise blockchain research supporting supply chain management
calls for investigations of their impact and mindfulness of their design, use cases, and pilots …
calls for investigations of their impact and mindfulness of their design, use cases, and pilots …
An application of Convolutional Neural Network to lobster grading in the Southern Rock Lobster supply chain
Abstract Southern Rock Lobster (SRL) is an important commercial export fishery of the
Australian economy with a contribution of $250 million annually. However, a range of risks …
Australian economy with a contribution of $250 million annually. However, a range of risks …
Quantitative analysis of RFID'publications from 2006 to 2016
This paper aims to verify the trends in the scientific research about Radio Frequency
Identification (RFID) published in journal papers from 2006 to 2016. RFID is a well-known …
Identification (RFID) published in journal papers from 2006 to 2016. RFID is a well-known …
Convolutional Neural Networks for individual identification in the Southern Rock Lobster supply chain
In most traceability system, product identification is the key to enable the tracking activities
along the supply chain to be carried out. Product tagging using barcode and RFID is the …
along the supply chain to be carried out. Product tagging using barcode and RFID is the …
ACD: An adaptable approach for RFID cloning attack detection
W Huang, Y Zhang, Y Feng - Sensors, 2020 - mdpi.com
With the rapid development of the internet of things, radio frequency identification (RFID)
technology plays an important role in various fields. However, RFID systems are vulnerable …
technology plays an important role in various fields. However, RFID systems are vulnerable …
Using blockchain for traceability in the drug supply chain
JC Molina, DT Delgado, G Tarazona - … , KMO 2019, Zamora, Spain, July 15 …, 2019 - Springer
The illegal trade of medication is a problem which has claimed lives all over the world. In
spite of the efforts from different international institutions aiming to stop this situation, illegal …
spite of the efforts from different international institutions aiming to stop this situation, illegal …
[PDF][PDF] IoT crawler with behavior analyzer at fog layer for detecting malicious nodes
IoT (Internet of Things) nodes make nodes an easy prey for malicious attacks, thus
threatening business and industry. Detecting malicious nodes before they trigger an attack is …
threatening business and industry. Detecting malicious nodes before they trigger an attack is …
[BOOK][B] Chipless RFID Authentication: Design, Realization and Characterization
Chipless RFID Authentication examines the development of highly secure product
authentication systems for manufactured products by using chipless radio frequency …
authentication systems for manufactured products by using chipless radio frequency …