A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

Multi-agent Systems for Resource Allocation and Scheduling in a smart grid

SS Binyamin, S Ben Slama - Sensors, 2022 - mdpi.com
Multi-Agent Systems (MAS) have been seen as an attractive area of research for civil
engineering professionals to subdivide complex issues. Based on the assignment's history …

SAI: A suspicion assessment-based inspection algorithm to detect malicious users in smart grid

X ** and metrological characterization of a data acquisition and processing system based on edge computing
G Lorenzini, F Conti, GRM Parenti… - … on Metrology for …, 2020 - ieeexplore.ieee.org
This paper describes a data acquisition and processing architecture developed for
monitoring industrial machineries. The architecture is based on the paradigm of edge …

ISS: Intelligent Security System Using Facial Recognition

B Pati - Progress in Advanced Computing and Intelligent …, 2020 - books.google.com
Security is mandatory and of utmost importance for all organizations. While the legitimate
people should be allowed inside enterprises, the illegal ones should be barred from …

Naïve Bayesian Approach to Intruder Detection in Smart Homes Using Sensor Networks

DJS Bolivar, DFK Gom-os - … on Advances in Computational Science and …, 2023 - Springer
We used camera, light, door, and window sensors, and day of the week, duration, and
activation time parameters for a Naïve Bayesian approach to intruder detection in a smart …

Prototy** Flow-Net Logging for Accountability Management in Linux Operating Systems

Y **ao, L Zeng, H Chen, T Li - IEEE Access, 2019 - ieeexplore.ieee.org
Accountability in conjunction with preventative countermeasures is necessary to satisfy the
needs of real-world computer security. A common method to achieve accountability is via …

[CITATION][C] Internet of Things

D Chawla, PS Mehra