Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Current research trends in IoT security: a systematic map** study
JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
Data encryption for internet of things applications based on catalan objects and two combinatorial structures
This article presents a novel data encryption technique suitable for Internet of Things (IoT)
applications. The cryptosystem is based on the application of a Catalan object (as a …
applications. The cryptosystem is based on the application of a Catalan object (as a …
[PDF][PDF] Encryption with User Authentication Model for Internet of Medical Things Environment.
KS Riya, R Surendran… - … Automation & Soft …, 2023 - researchgate.net
Internet of Medical Things (IoMT) enabled e-healthcare has the potential to greately improve
conventional healthcare services significantly. However, security and privacy become major …
conventional healthcare services significantly. However, security and privacy become major …
Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices
N Yasmin, R Gupta - International Journal of Information Technology, 2024 - Springer
The internet of things (IoT) ensures flexible network services to the end devices connected to
it. Although security has always been a concern for such networks. There are several …
it. Although security has always been a concern for such networks. There are several …
Cryptography algorithms for improving the security of cloud‐based internet of things
In today's fast‐paced society, the Internet of Things (IoT) is revolutionizing businesses by
bridging the gap between the digital and physical realms. This transformative technology …
bridging the gap between the digital and physical realms. This transformative technology …
A Survey on Cybersecurity in IoT.
The proliferation of the Internet of Things (IoT) has transformed the digital landscape,
enabling a vast array of interconnected devices to communicate and share data seamlessly …
enabling a vast array of interconnected devices to communicate and share data seamlessly …
Internet of Things Authentication Protocols: Comparative Study.
Nowadays, devices are connected across all areas, from intelligent buildings and smart
cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things …
cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things …
Assessment of potential security risks in advanced metering infrastructure using the OCTAVE Allegro approach
One of the crucial components of a smart grid is the advanced metering infrastructure (AMI),
which integrates information and communication technologies with a conventional electricity …
which integrates information and communication technologies with a conventional electricity …
[HTML][HTML] AIBPSF-IoMT: artificial intelligence and blockchain-based predictive security framework for IoMT technologies
BM Alshammari - Electronics, 2023 - mdpi.com
The latest advancements in artificial intelligence (AI) technologies, including machine and
deep learning models, in prediction, recommending, and automating processes have greatly …
deep learning models, in prediction, recommending, and automating processes have greatly …
Energy‐Aware Intrusion Detection Model for Internet of Vehicles Using Machine Learning Methods
L Lihua - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
With increasing development of Internet of Things (IoT) technology, wireless
communications, big data, and smart applications, vehicular communications have become …
communications, big data, and smart applications, vehicular communications have become …