Z Elkhwesky, EFY Elkhwesky - International Journal of Contemporary …, 2022 - emerald.com
Purpose Internet of Things (IoT) is a key enabler of big data and it is critical toward a new age of firm's architecture and proper decision-making for the industry. IoT adoption by the …
G Xu, Y Cao, Y Ren, X Li, Z Feng - IEEE Access, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) brings the third development wave of the global information industry, which makes users, network, and perception devices cooperate more closely. However, if …
J Liang, M Zhang, VCM Leung - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Social sensor cloud (SSC) is combined with social network, wireless sensor network, cloud computing, and fog computing, which is currently a new type of Internet of Things (IoT). In …
Y Cao, A Yang, H Li, Q Zeng, J Gao - Computers & Security, 2024 - Elsevier
The enhancement of security management for smart manufacturing has garnered considerable attention, prompting extensive research efforts that explore AI-based secure …
The paper aims at proposing an original summarization technique from Online Social Networks (OSNs) for multimedia stories' creation. In particular, for each Multimedia Social …
P Whig, S Kouser, K Puruhit, N Alam… - Internet of Things and …, 2022 - taylorfrancis.com
Communities get a unique characteristic that relies on the combination of Information and Communications Technology (ICT) services and improvements to manage complex data in …
S Zhang, G Bai, H Li, P Liu, M Zhang, S Li - Sensors, 2021 - mdpi.com
Nowadays, there are different kinds of public knowledge bases for cyber security vulnerability and threat intelligence which can be used for IoT security threat analysis …
C Manchanda, N Sharma, R Rathi… - 2020 IEEE 9th …, 2020 - ieeexplore.ieee.org
A Smart city is an area that practice several kinds of automated Internet of Things (IoT) sensors to gather information and then make efficient use of perceptions acquired from that …
Ambient Intelligence deployments are very vulnerable to Cyber-Physical attacks. In these attacking strategies, intruders try to manipulate the behavior of the global system by affecting …