Situ-Oracle: A Learning-Based Situation Analysis Servicing Framework for BIoT Systems

H Bian, W Zhang, CK Chang - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The emergence of blockchain technologies and the rapid growth of the Internet of Things
(IoT) have brought blockchain-premised IoT (BIoT) systems into the focus of recent studies …

The Role of Digital Trust in Enhancing Cyber Security Resilience

PK Malik - Transforming Industry using Digital Twin Technology, 2024 - Springer
Digital trust and cyber-security are two of the most important aspects of modern technology.
Digital trust is the confidence that users have in the security of their digital assets, such as …

Método de auditor a informática basado en sistemas de procesamiento avanzado de datos que permita minimizar el riesgo de calidad de los resultados

DE Imbaquingo Esparza - 2023 - sedici.unlp.edu.ar
Las Instituciones de Educación Superior (IES) no disponen de un método o marco
referencial que apoye al proceso de auditoría, que haga uso de técnicas estratégicas …

A Securing the Data Using a Novel Security Algorithm S-RKB-22

C Bagath Basha, S Rajaprakash, V Subapriya… - … conference on WorldS4, 2023 - Springer
Today's world depending on the data because of this data is most powerful in public sector.
This data only decided the people's life good or bad, similarly the world financial market …

Hsing-Chung Chen¹, 2 (), Yao-Hsien Liang¹, Jhih-Sheng Su¹, Kuen-Yu Tsai³

YL Song, PY Hsu¹, JS Cai - Innovative Mobile and Internet …, 2023 - books.google.com
Today, information technology (IT) and operational technology (OT) accelerate the
development of Intelligence of Things (IoT) systems, which consist of modular integrated …

[PDF][PDF] IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices. Sustainability 2022, 14, 14645

A Bhardwaj, K Kaushik, S Bharany, AU Rehman… - 2022 - researchgate.net
The Internet of Things (IoT) has redefined several aspects of our daily lives, including
automation and control of the living environment, innovative healthcare services, and much …

Lightweight Pairwise Key Distribution Scheme for IoTs.

K Kaur - Journal of Cybersecurity Education, Research and …, 2023 - ERIC
Embedding a pairwise key distribution approach in IoT systems is challenging as IoT
devices have limited resources, such as memory, processing power, and battery life. This …

[PDF][PDF] Intrusion Detection Based on Feature Reduction and Model Pruning in Electricity Trading Network

Z Liu, R Zhou, K Huang, X Hu, Z Jiang, B Cai… - Journal of …, 2023 - csroc.org.tw
The electricity trading network increases network flexibility and lowers trading costs with the
aid of 5G and IOT technology. While it has improved trading efficiency and enhanced system …

Introduction to Internet of Things Security

CS Dule, KM Rajasekharaiah - Secure Communication in Internet …, 2024 - taylorfrancis.com
The Internet of Things (IoT) consists of various interconnected devices, objects, services,
networks, and cloud technology that sense and collect data about the environment around …

[PDF][PDF] Secure Inter-Domain Routing for Resisting Unknown Attacker in Internet-of-Things

A Bhavana, NK AN - International Journal of Advanced …, 2022 - pdfs.semanticscholar.org
(IoT) over massively connected device, there is a raising security concern. Review of
existing security schemes in IoT shows that there is a significant trade-off due to non …