Anomaly detection is crucial to ensure the security of cyber-physical systems (CPS). However, due to the increasing complexity of CPSs and more sophisticated attacks …
A Koohang, CS Sargent, JH Nord… - International Journal of …, 2022 - Elsevier
This paper proposes a research model with five constructs, ie, IoT awareness, users' IoT privacy knowledge, users' IoT security knowledge, users' IoT Trust, and continued intention …
Abstract The Internet of Things (IoT) redefines the way how commodity and industrial tasks are performed every day. The integration of sensors, lightweight computation, and the …
Virtually any software running on a computer has been processed by a compiler or a compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
In today's highly competitive markets, organizations can create a competitive advantage through the successful implementation of Enterprise Resource Planning (ERP) systems …
Cognitive radio (CR)-based Internet of Things (IoT) system is an effective step toward a world of smart technology. Many frameworks have been proposed to build CR-based IoT …
Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT) infrastructures, home automation (HA) systems have emerged as a new promising paradigm …
Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …
The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published …