Search

Your search keyword '"IoT devices"' showing total 619 results

Search Constraints

Start Over You searched for: Descriptor "IoT devices" Remove constraint Descriptor: "IoT devices"
619 results on '"IoT devices"'

Search Results

2. Compact planar 28/60‐GHz wideband MIMO antenna for 5G‐enabled IoT devices.

3. IoT malware detection using static and dynamic analysis techniques: A systematic literature review.

4. Kafka‐Shield: Kafka Streams‐based distributed detection scheme for IoT traffic‐based DDoS attacks.

5. Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective.

6. Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network.

7. Intelligent resource optimization for scalable and energy-efficient heterogeneous IoT devices.

8. Harnessing Blockchain and IoT for Carbon Credit Exchange to Achieve Pollution Reduction Goals.

9. Leveraging IoT Devices for Atrial Fibrillation Detection: A Comprehensive Study of AI Techniques.

10. Ecophysiology of Mediterranean Chestnut (Castanea sativa Mill.) Forests: Effects of Pruning Studied through an Advanced IoT System.

11. IDFE:面向物联网设备识别的指纹深度提取方法.

12. Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia

13. SC-SA: Byte-Oriented Lightweight Stream Ciphers Based on S-Box Substitution.

14. SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks.

15. A Dual-Step Approach for Implementing Smart AVS in Cars.

16. Modeling Trust in IoT Systems for Drinking-Water Management.

17. Handling Power Depletion in Energy Harvesting IoT Devices.

18. ANÁLISIS BIBLIOGRÁFICO DE LAS TECNOLOGÍAS IOT EN LA TELEMEDICINA PARA EL TRATAMIENTO DE ENFERMEDADES CARDIOVASCULARES.

19. Use of edge resources for DNN model maintenance in 5G IoT networks.

20. IoT-based real-time object detection system for crop protection and agriculture field security.

21. Emerging wireless communication technologies in Iraqi government: Exploring cloud, edge, and fog computing.

22. A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions.

23. Multi-Objective Evolutionary Algorithm to Optimize IoT Based Scheduling Problem Using (NSGA-II Algorithm).

24. IOT CİHAZLARINDA İNSAN HATASINDAN KAYNAKLANAN GÜVENLİK AÇIKLARININ ANALİZİ.

25. Utilizing Fog Computing to Secure Smart Health Care Monitoring (SHM) in Smart Cities

27. Collaborative Communication and Monitoring Ecosystem for Elderly Care

28. Designing a Smart Lighting System for Illuminating Learning Experiences

29. Edge Computing Security: Overview and Challenges

31. A Secure Multi-factor Authentication Framework for IoT-Environment Using Cloud Computing

32. Robust Method for Accessing IoT Devices and Blockchain for Secure Data Management

33. Design and Optimization of a Sub-threshold CMOS LDO Regulator with Improved Performance for IoT and Wearable Devices

35. Review on Privacy Preservation Techniques and Challenges in IoT Devices

36. Securing IoT Networks Using Machine Learning, Deep Learning Solutions: A Review

37. Markov Process Based IoT Model for Road Traffic Prediction

41. Smart Locking System Using AR and IoT

42. A Detection Approach for IoT Traffic-Based DDoS Attacks

43. Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices

44. A Survey Study and Comparison of Drones Communication Systems

46. Highly integrable planar-structured printed circularly polarized antenna for emerging wideband internet of things applications in the millimeter-wave band

47. The impact of Caputo-Fabrizio fractional derivative and the dynamics of noise on worm propagation in wireless IoT networks

48. Highly integrable planar-structured printed circularly polarized antenna for emerging wideband internet of things applications in the millimeter-wave band.

49. Extended Review Concerning the Integration of Electrochemical Biosensors into Modern IoT and Wearable Devices.

50. Res-DFNN: An NN-Based Device Fingerprint Extraction Method Using Network Packet Data.

Catalog

Books, media, physical & digital resources