The internet of drones: Requirements, taxonomy, recent advances, and challenges of research trends
A Abdelmaboud - Sensors, 2021 - mdpi.com
The use of unmanned aerial vehicles or drones are a valuable technique in co** with
issues related to life in the general public's daily routines. Given the growing number of …
issues related to life in the general public's daily routines. Given the growing number of …
An overview of internet of things
S Villamil, C Hernández… - … Electronics and Control), 2020 - telkomnika.uad.ac.id
The internet of things is an emerging technology that is currently present in most processes
and devices, allowing to improve the quality of life of people and facilitating the access to …
and devices, allowing to improve the quality of life of people and facilitating the access to …
AI4SAFE-IoT: An AI-powered secure architecture for edge layer of Internet of things
With the increasing use of the Internet of things (IoT) in diverse domains, security concerns
and IoT threats are constantly rising. The computational and memory limitations of IoT …
and IoT threats are constantly rising. The computational and memory limitations of IoT …
AI-assisted service virtualization and flow management framework for 6G-enabled cloud-software-defined network-based IoT
G Manogaran, T Baabdullah, DB Rawat… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The sixth-generation (6G) communication technology provides a high level of
interoperability through terahertz data transfer and latency-less service sharing. Due to its …
interoperability through terahertz data transfer and latency-less service sharing. Due to its …
Microservice security: a systematic literature review
Microservices is an emerging paradigm for develo** distributed systems. With their
widespread adoption, more and more work investigated the relation between microservices …
widespread adoption, more and more work investigated the relation between microservices …
An enhanced authentication protocol for RFID systems
In this paper, we analyse the security of two mutual authentication protocols that have been
recently proposed by Gao et al.(IEEE Access, 7: 8376-8384, 2019), a hash-based protocol …
recently proposed by Gao et al.(IEEE Access, 7: 8376-8384, 2019), a hash-based protocol …
Smart manufacturing implementation: identifying barriers and their related stakeholders and components of technology
Purpose One of the achievements of the fourth industrial revolution is smart manufacturing, a
manufacturing system based on Industry 4.0 technologies that will increase systems' …
manufacturing system based on Industry 4.0 technologies that will increase systems' …
An Advanced Strategy for Addressing Heterogeneity in SDN-IoT Networks for Ensuring QoS
The internet of things (IoT) is a complex system that includes multiple technologies and
services. However, its heterogeneity can result in quality-of-service (QoS) issues, which may …
services. However, its heterogeneity can result in quality-of-service (QoS) issues, which may …
A systematic literature review of iot system architectural styles and their quality requirements
The Internet of Things (IoT) is increasingly prevalent, with systems developed across various
domains. Choosing the right IoT architectural style is challenging due to the diversity of …
domains. Choosing the right IoT architectural style is challenging due to the diversity of …
Towards a taxonomy of privacy requirements based on the LGPD and ISO/IEC 29100
Context: Ensuring compliance with current data privacy legislation poses a significant
challenge for software development teams, demanding adaptations to processes in order to …
challenge for software development teams, demanding adaptations to processes in order to …