[PDF][PDF] A Comprehensive Survey of internet of things applications, Threats, and Security Issues

YH Reddy, A Ali, PV Kumar, MH Srinivas… - South Asian Res J …, 2022 - researchgate.net
The Internet of Things (IoT) is a novel way of providing a wide range of solutions. The IoT
includes a variety of small smart devices. Their use, size, power, and computation power …

Performance improvements of AODV by black hole attack detection using IDS and digital signature

MI Talukdar, R Hassan, MS Hossen… - Wireless …, 2021 - Wiley Online Library
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly,
where there is no central administration. They are prone to different types of attacks such as …

A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic-and fog-based approach

SR Zahra, MA Chishti - Neural Computing and Applications, 2022 - Springer
Inspired by the massive surge of interest in the Internet of Things (IoT), this work focuses on
the kinetics of its security. By automating everything, starting from baby monitors to life …

Applications and Techniques of Natural Language Processing: An Overview.

R Varaprasad, G Mahalaxmi - IUP Journal of Computer …, 2022 - search.ebscohost.com
Abstract Natural Language Processing (NLP) makes it easier for people to communicate
with computers. Discourse analysis, morphological separation, machine translation, natural …

[PDF][PDF] Future of Smart Cities: The Role of Machine Learning and Artificial Intelligence

IVD Srihith, IVS Kumar, R Varaprasad… - … Research Journal of …, 2022 - researchgate.net
The goals of" smart cities" include relieving the burden of growing urbanisation, cutting down
on energy use, protecting the environment, boosting the local economy and people's …

[PDF][PDF] Photovoltaic, internet-of-things-enabled intelligent agricultural surveillance system

YH Reddy, A Ali, AZ Sha, P Madhulaya… - South Asian Res. J …, 2022 - sarpublication.com
The implementation of wireless communication technologies for monitoring and control
systems resulted in the first instance of" smart" farming. Precision agriculture (PA) is …

Performance improvements of routing protocol by blackhole detection using trust based scheme

AV Jatti, VJKK Sonti - 2022 4th IEEE Middle East and North …, 2022 - ieeexplore.ieee.org
Present study demonstrate the denial of service (DoS) attack namely black hole attacks in ad
hoc on-demand distance vector (AODV) routing protocol. In this study three methods are …

The Algorithm Optimization of Data Layering Wireless Sensor Network for Photovoltaic Power Station Based on ZigBee and LoRa

K Li - 2023 15th International Conference on Communication …, 2023 - ieeexplore.ieee.org
With the proposal of the national policy of carbon peak and carbon neutrality, photovoltaic
array power generation has become a hot energy supply method recently. However, large …

A Black Hole Attack Protection Approach in IoT-Based Applications Using RLNC

A Syed, B Gadgay - … Challenges for Cyber Security and Data Privacy, 2023 - igi-global.com
Smart environments have recently transformed the standard of human existence by
increasing comfort and efficiency. IoT, or the internet of things, has become an instrument for …

Internet das coisas aplicada à análise e correlação de dados da construção civil

CLD Silva, PB Segobia, VP Silva… - SIMPÓSIO …, 2021 - eventos.antac.org.br
A internet das coisas (IoT) é uma complexa tecnologia de integração ambientada com
software e hardware, tecnologia de sensores, de circuitos integrados e de aplicação …