Seguridad Adaptativa: mecanismos y dominios de aplicación

M Calvo Matalobos - 2023 - burjcdigital.urjc.es
El objetivo de esta tesis doctoral es proponer un nuevo modelo de seguridad adaptativa
basado en el riesgo. Este modelo puede funcionar en entornos complejos, heterogéneos y …

[PDF][PDF] LGuard: Securing Enterprise-IoT Systems against Serial-based Atacks via Proprietary Communication Buses

LP RONDON, L BABUN, A ARIS, K AKKAYA… - 2022 - academia.edu
The rapid adoption of specialty smart systems has changed the lives of millions of users
worldwide [28]. As part of these ecosystems, Enterprise Internet of Things (E-IoT) are smart …

Real Time Monitoring and Configuration Interface for Smart Home Device Management Using Streamlit and Pygame

GS Mani, GV Krishna, MDA Praveena… - … on Advances in …, 2024 - ieeexplore.ieee.org
One of the helpful tool for measuring and managing home power consumption is one of the
clever and creative tool for tracking the usage of Home Power Management System. The …

Empowering End Users to Mitigate Privacy and Security Risks in Smart-Home Trigger-Action Apps

M Saeidi - 2022 - ir.library.oregonstate.edu
Many home users nowadays use various smart devices to improve the efficiency and
convenience of their home environments. Trigger-action platforms such as “If-This-Then …

[PDF][PDF] The effect of lighting levels on lighting preferences for older adults using a non-immersive virtual environment of their residences

EE Ilgaz - 2023 - repository.bilkent.edu.tr
People who are over 60 years old are referred to as older adults and 12, 5% of the whole
world population in 2015 are older adults. This quantity of population is still increasing …

Methodology Development for Improving the Performance of Critical Classification Applications

S Afrose - 2023 - vtechworks.lib.vt.edu
People interact with different critical applications in day-to-day life. Some examples of critical
applications include computer programs, anonymous vehicles, digital healthcare, smart …

MULTIPARTY COLLABORATION IN EDGE COMPUTING SYSTEMS

P Pradeep Kumar - 2023 - scholarshare.temple.edu
With the recent wave of technological advancements, the deployment of the``Internet of
Things''(IoT) is becoming ubiquitous, ranging from typical home and personal appliances to …

Token Based Authentication and Modified Hashing Approach to Improve the Security of Internet of Things Enabled Wireless Networks

JR Mohanty, MR Mohapatra, S Mishra… - Journal of Survey …, 2023 - sifisheriessciences.com
The concept of Internet of Things (IoT) is continuously evolving day to day and thus allowing
various applications in different fields such as agriculture, education, industry, health …

Leveraging the heterogeneity of the internet of things devices to improve the security of smart environments

K Krawiecka - 2022 - ora.ox.ac.uk
The growing number of devices that are being incorporated into the Internet of Things (IoT)
environments leads to a wider presence of a variety of sensors, making these environments …

Improving Proactive Defenses for Network-Based Services

Z Shu - 2022 - search.proquest.com
Network-based services are ubiquitous in today's cyberspace. To secure network-based
services that have become increasingly complicated, it is often necessary to deploy …