A survey of intellectual property rights protection in big data applications

R Hamza, H Pradana - Algorithms, 2022 - mdpi.com
Big Data applications have the potential to transform any digital business platform by
enabling the analysis of vast amounts of data. However, the biggest problem with Big Data is …

A Review of IoT Firmware Vulnerabilities and Auditing Techniques

T Bakhshi, B Ghita, I Kuzminykh - Sensors, 2024 - mdpi.com
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …

Stability Verification of Self‐Organized Wireless Networks with Block Encryption

VY Sokolov, P Skladannyi… - Cybersecurity Providing in …, 2022 - elibrary.kubg.edu.ua
Sensor networks allow the transmission of data for medical and research purposes. They
are essential for building IoT wireless networks. The widespread use of such networks …

Development and operation analysis of spectrum monitoring subsystem 2.4–2.5 GHz range

Z Hu, V Buriachok, I Bogachuk, V Sokolov… - Data-Centric Business …, 2020 - Springer
The paper presents a substantiation of the effectiveness of IEEE 802.11 wireless network
analysis subsystem implementation using miniature spectrum analyzers. Also it was given …

Age-of-information oriented scheduling for multichannel IoT systems with correlated sources

J Tong, L Fu, Z Han - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
Age-of-information (AoI) based minimization problems have been widely considered in
Internet-of-Things (IoT) networks with the settings of multi-source single-channel systems …

[PDF][PDF] A Novel Algorithm to Secure Data in New Generation Health Care System from Cyber Attacks Using IoT

A Kavitha, BS Rao, N Akthar, SM Rafi… - International Journal of …, 2022 - academia.edu
░ ABSTRACT-The rise of digital technology has essentially enhanced the overall
communication and data management system, facilitating essential medical care services …

Performance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks

A Cortés-Leal, C Del-Valle-Soto, C Cardenas… - Sensors, 2021 - mdpi.com
The emergence of Industry 4.0 technologies, such as the Internet of Things (IoT) and
Wireless Sensor Networks (WSN), has prompted a reconsideration of methodologies for …

Secure energy aware routing protocol for trust management using enhanced Dempster Shafer evidence model in multi-hop UWAN

SN Mahapatra, BK Singh, V Kumar - Wireless Networks, 2022 - Springer
At present, underwater wireless ad hoc networks (UWAN) are widely used in enormous
applications. At the same time, UWAN faced many security issues, like energy leaks. The …

Method for Increasing the Various Sources Data Consistency for IoT Sensors

V Sokolov, F Kipchuk, P Skladannyi… - 2022 IEEE 9th …, 2022 - ieeexplore.ieee.org
The paper represents importance of performing data consistency operations with data sets,
where it is possible and essential. Producing vast amounts of data by the Internet of Things …

The challenges with Internet of Things security for business

I Kuzminykh, B Ghita, JM Such - International Conference on Next …, 2021 - Springer
Many companies consider IoT as a core element for increasing competitiveness. Despite the
growing number of cyberattacks on IoT devices and the importance of IoT security, no study …