Security weaknesses and attacks on the internet of things applications
Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a contemporary concept for connecting the existing things in our
environment with the Internet for a sake of making the objects information are accessible …
environment with the Internet for a sake of making the objects information are accessible …
On the security of the standardized MQV protocol and its based Evolution Protocols
The MQV is an authenticated key agreement protocol which does not use any one-way hash
functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …
functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …
Arabic text categorization: A comparison survey
Text categorization acquires more significance considering the plenty of text added
continually on the web. The lack of huge and free Arabic datasets makes it more difficult to …
continually on the web. The lack of huge and free Arabic datasets makes it more difficult to …
[PDF][PDF] An Efficient System for Reducing the Power Consumption in Offices Using the Internet of Things.
Nowadays, Electricity energy is considered the lifeblood of many companies and industrial
institutions. Most of these companies and industrial institutions are suffering from the high …
institutions. Most of these companies and industrial institutions are suffering from the high …
Comparison between IPv4 and IPv6 using OSPF and OSPFv3 on riverbed modeler
In multiple path networks, the routing protocols are used to find the low-cost shortest path
and the protocols which give its best measurements are selected for network execution. The …
and the protocols which give its best measurements are selected for network execution. The …
Analysis of link failures and recoveries on 6to4 tunneling network with different routing protocol
Failure recovery is an essential discussion in communication to guarantee the network's
undisturbed and reliable service. Failed links have been affecting the communication …
undisturbed and reliable service. Failed links have been affecting the communication …
A novel recommender system using interest extracting agents and user feedback
Recommender Systems have been used widely to provide suggestions to users based on
their interests. Although many works have proposed recommender systems in the literature …
their interests. Although many works have proposed recommender systems in the literature …
[PDF][PDF] Performance Comparison of Routing Protocols
This paper focuses the study of different routing protocols used in computer networks. A
routing protocol is a protocol that specifies how routers communicate with each other …
routing protocol is a protocol that specifies how routers communicate with each other …
Water preservation using IoT: A proposed IoT system for detecting water pipeline leakage
A Abusukhon, F Altamimi - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
In the recent era, the Internet of Things (IoT) technology contributes in the development of
many activities and aspects in our life. One of these aspects is agriculture. Agriculture is …
many activities and aspects in our life. One of these aspects is agriculture. Agriculture is …
Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem
Authenticated key exchange protocols are a fundamental cryptography building block for
establishing a secret shared key among participating parties over an open network model …
establishing a secret shared key among participating parties over an open network model …