Securing Tomorrow's Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies

R Jain, N Tihanyi, MA Ferrag - arXiv preprint arXiv:2407.16410, 2024 - arxiv.org
Integrating Deep Learning (DL) techniques in the Internet of Vehicles (IoV) introduces many
security challenges and issues that require thorough examination. This literature review …

A Novel Architecture for the Smart Pedestrian Crossing in Cities Using IoT‐Based Approach

M Bhardwaj, S Singh, S Tyagi, A Tripathi… - Mathematical …, 2023 - Wiley Online Library
Pedestrian crossings have also been highlighted as one of the most dangerous locations in
the transportation field. Because people and vehicles share the road, a crosswalk improves …

[PDF][PDF] Design of maintaining data security on IoT data transferred through IoT gateway system to cloud storage

SA Suresh, RJ Priyadarsini - Int. J. Comput. Netw. Appl, 2022 - academia.edu
IoT is a smart-device environment; it acts smarter and gives higher quality to enhance the
user experience. IoT is an open network environment. However, IoT's security challenges …

Efficient security algorithm for provisioning constrained internet of things (iot) devices

J Mamvong - 2023 - qmro.qmul.ac.uk
Addressing the security concerns of constrained Internet of Things (IoT) devices, such as
client-side encryption and secure provisioning remains a work in progress. IoT devices …

Real Time Fruit Recognition and Calories Estimation Using CNN and Model Deployment on Amazon's AWS

VK Roy, GK Roy, V Thakur, N Baliyan… - 2023 3rd …, 2023 - ieeexplore.ieee.org
To carry out vigorous and effective fruit recognition in farming is difficult since there are a
number of variations. Lately, various deep-learning approaches presented an outstanding …

Secret Key Design Using an Algebraic Procedure (KAP) for Encrypted Energy Internet-of-Things (EIoT) Contents

AM Al-Ghaili, H Kasim, NM Al-Hada, Z Hassan… - … Science and Technology, 2022 - Springer
This study designs a secret Key using an Algebraic Procedure (KAP). KAP has the capability
to act in a different manner dependent on the plaintext input. Two different secret key length …

Implementation of Blockchain security for Cloud and IOT Environment

R Shwetha, RJSKAC Srinivas… - …, 2022 - search.proquest.com
Background: The use of blockchain technology is sweeping the globe. Using its unique,
transparent and secure characteristics, in the next generation of several industrial …

[引用][C] Application of Intrusion Detection Systems in Internet of Things by surpassing IoT related restrictions

H Azzaoui - 2022 - University Kasdi Merbah Ouargla