Smart home security: challenges, issues and solutions at different IoT layers

H Touqeer, S Zaman, R Amin, M Hussain… - The Journal of …, 2021 - Springer
Abstract The Internet of Things is a rapidly evolving technology in which interconnected
computing devices and sensors share data over the network to decipher different problems …

A survey of software clone detection from security perspective

H Zhang, K Sakurai - IEEE Access, 2021 - ieeexplore.ieee.org
For software engineering, if two code fragments are closely similar with minor modifications
or even identical due to a copy-paste behavior, that is called software/code clone. Code …

Proof of delivery smart contract for performance measurements

Y Madhwal, Y Borbon-Galvez, N Etemadi… - IEEE …, 2022 - ieeexplore.ieee.org
The growth of the enterprise blockchain research supporting supply chain management
calls for investigations of their impact and mindfulness of their design, use cases, and pilots …

An application of Convolutional Neural Network to lobster grading in the Southern Rock Lobster supply chain

SA Vo, J Scanlan, P Turner - Food Control, 2020 - Elsevier
Abstract Southern Rock Lobster (SRL) is an important commercial export fishery of the
Australian economy with a contribution of $250 million annually. However, a range of risks …

Quantitative analysis of RFID'publications from 2006 to 2016

AO de Oliveira, HLS Oliveira, CFS Gomes… - International Journal of …, 2019 - Elsevier
This paper aims to verify the trends in the scientific research about Radio Frequency
Identification (RFID) published in journal papers from 2006 to 2016. RFID is a well-known …

Convolutional Neural Networks for individual identification in the Southern Rock Lobster supply chain

SA Vo, J Scanlan, P Turner, R Ollington - Food Control, 2020 - Elsevier
In most traceability system, product identification is the key to enable the tracking activities
along the supply chain to be carried out. Product tagging using barcode and RFID is the …

ACD: An adaptable approach for RFID cloning attack detection

W Huang, Y Zhang, Y Feng - Sensors, 2020 - mdpi.com
With the rapid development of the internet of things, radio frequency identification (RFID)
technology plays an important role in various fields. However, RFID systems are vulnerable …

Using blockchain for traceability in the drug supply chain

JC Molina, DT Delgado, G Tarazona - … , KMO 2019, Zamora, Spain, July 15 …, 2019 - Springer
The illegal trade of medication is a problem which has claimed lives all over the world. In
spite of the efforts from different international institutions aiming to stop this situation, illegal …

[PDF][PDF] IoT crawler with behavior analyzer at fog layer for detecting malicious nodes

L Albdour, S Manaseer, A Sharieh - International Journal of …, 2020 - academia.edu
IoT (Internet of Things) nodes make nodes an easy prey for malicious attacks, thus
threatening business and industry. Detecting malicious nodes before they trigger an attack is …

[BOOK][B] Chipless RFID Authentication: Design, Realization and Characterization

Z Ali, E Perret, N Barbot, R Siragusa - 2022 - books.google.com
Chipless RFID Authentication examines the development of highly secure product
authentication systems for manufactured products by using chipless radio frequency …