Digitalization of agriculture for sustainable crop production: a use-case review
The digitalization of agriculture is rapidly changing the way farmers do business. With the
integration of advanced technology, farmers are now able to increase efficiency, productivity …
integration of advanced technology, farmers are now able to increase efficiency, productivity …
A cybersecurity review in IoT 5G Networks
D Narciandi-Rodr, J Aveleira-Mata, J Alfonso-Cend… - Internet of Things, 2024 - Elsevier
This review conducts a thorough investigation of recent documentation avail-able in major
data repositories, enabling the comprehensive summarization, synthesis, and …
data repositories, enabling the comprehensive summarization, synthesis, and …
Autonomous traffic system for emergency vehicles
An emergency can occur at any time. To overcome that emergency efficiently, we require
seamless movement on the road to approach the destination within a limited time by using …
seamless movement on the road to approach the destination within a limited time by using …
Fifth-generation telecommunications technologies: Features, architecture, challenges and solutions
MJ Al-Dujaili, MA Al-dulaimi - Wireless Personal Communications, 2023 - Springer
The fifth generation of telecommunication systems is a familiar name in recent years. Many
countries around the world have chosen this generation as the basic generation in …
countries around the world have chosen this generation as the basic generation in …
[HTML][HTML] Blockchain-enabled anonymous mutual authentication and location privacy-preserving scheme for 5G networks
Z Haddad - Journal of King Saud University-Computer and …, 2023 - Elsevier
Abstract Fifth-generation (5G) networks are about to become the backbone of
communications through their integration with many services such as software-defined …
communications through their integration with many services such as software-defined …
Risk Management and Cybersecurity in Transportation and Warehousing
Transportation and warehousing are vital components of logistics corporations. Their
continuous uninterrupted functioning is of paramount significance for the enterprises …
continuous uninterrupted functioning is of paramount significance for the enterprises …
[PDF][PDF] Latest advances on security architecture for 5G technology and services
Latest Advances on Security Architecture for 5G Technology and Services Page 1
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING & COMPUTER SYSTEMS (IJSECS) …
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING & COMPUTER SYSTEMS (IJSECS) …
[HTML][HTML] General secure encryption algorithm for separable reversible data hiding in encrypted domain
H Wan, M Zhang, Y Ke, Z Jiang, F Di - Journal of King Saud University …, 2024 - Elsevier
The separable reversible data hiding in encrypted domain (RDH-ED) algorithm leaves out
the embedding space for the information before or after encryption and makes the operation …
the embedding space for the information before or after encryption and makes the operation …
A threat modeling framework for IoT-Based botnet attacks
Abstract Internet of Things (IoT) devices are much closer to users than personal computers
used in traditional computing environments. Due to prevalence of IoT devices, even if they …
used in traditional computing environments. Due to prevalence of IoT devices, even if they …
The Internet of Things (IoT) Is Revolutionizing Inventory Management
IA Shah, A Sial, SN Brohi - … Cyber Threats and Cybersecurity in the …, 2024 - igi-global.com
Every part of the supply chain has been affected by the rise of Industry 4.0 technologies.
Many businesses have been trying out this modern technology to see if it can help them …
Many businesses have been trying out this modern technology to see if it can help them …