A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
Multi-agent Systems for Resource Allocation and Scheduling in a smart grid
Multi-Agent Systems (MAS) have been seen as an attractive area of research for civil
engineering professionals to subdivide complex issues. Based on the assignment's history …
engineering professionals to subdivide complex issues. Based on the assignment's history …
SAI: A suspicion assessment-based inspection algorithm to detect malicious users in smart grid
X ** and metrological characterization of a data acquisition and processing system based on edge computing
G Lorenzini, F Conti, GRM Parenti… - … on Metrology for …, 2020 - ieeexplore.ieee.org
This paper describes a data acquisition and processing architecture developed for
monitoring industrial machineries. The architecture is based on the paradigm of edge …
monitoring industrial machineries. The architecture is based on the paradigm of edge …
ISS: Intelligent Security System Using Facial Recognition
B Pati - Progress in Advanced Computing and Intelligent …, 2020 - books.google.com
Security is mandatory and of utmost importance for all organizations. While the legitimate
people should be allowed inside enterprises, the illegal ones should be barred from …
people should be allowed inside enterprises, the illegal ones should be barred from …
Naïve Bayesian Approach to Intruder Detection in Smart Homes Using Sensor Networks
DJS Bolivar, DFK Gom-os - … on Advances in Computational Science and …, 2023 - Springer
We used camera, light, door, and window sensors, and day of the week, duration, and
activation time parameters for a Naïve Bayesian approach to intruder detection in a smart …
activation time parameters for a Naïve Bayesian approach to intruder detection in a smart …
Prototy** Flow-Net Logging for Accountability Management in Linux Operating Systems
Accountability in conjunction with preventative countermeasures is necessary to satisfy the
needs of real-world computer security. A common method to achieve accountability is via …
needs of real-world computer security. A common method to achieve accountability is via …