IoT technologies for Augmented Human: A survey

R Pirmagomedov, Y Koucheryavy - Internet of Things, 2021 - Elsevier
Abstract Internet of Things (IoT) technology has delivered new enablers for improving
human abilities. These enablers promise an enhanced quality of life and professional …

Performance Analysis of Authentication System: A Systematic Literature Review

D Singla, N Verma - Recent Advances in Computer Science and …, 2024 - benthamdirect.com
Background: Data authentication is vital nowadays, as the development of the internet and
its applications allow users to have all-time data availability, attracting attention towards …

A system dynamics approach to building counterfeit avoidance programs

MJ Vepraskas, BW Stirgwolt - Computers & Security, 2024 - Elsevier
Recent disruptions and shortages across the global supply chain have heightened
awareness of resiliency and security risks for consumers, industry, and consumers. Of …

The model of WBAN data acquisition network based on UFP

S Vladimirov, V Vishnevsky, A Larionov… - … on Distributed Computer …, 2020 - Springer
The paper determines the general model of an unmanned flying platforms based network for
collecting information from wearable wireless body area networks. There are considered …

[HTML][HTML] Investigation of the optimal method for generating and verifying the smartphone's fingerprint: a review

SJ Alsunaidi, AM Almuhaideb - Journal of King Saud University-Computer …, 2022 - Elsevier
The technical transformation and transfer of most services to digital platforms require that
everyone has an electronic device connected to the Internet to assist them accomplish their …

DOA Based Identification for Devices and Applications of IoT in Heterogeneous Networks

M Al-Bahri, W Al Kishri - The International Conference on Innovations in …, 2022 - Springer
This paper proposes a method for recognizing Internet of Things devices and applications in
heterogeneous networks based on the Digital Objects Architecture (DOA). Also, the work …

Blockchain-driven hybrid model for IoT authentication

TD Dinh, TD Le, KQ Dang, V Vishnevsky… - … Conference on Next …, 2022 - Springer
Abstract The Internet of Things has the potential to play a significant part in the ongoing
Industrial Revolution. Machines, devices, and sensors are able to connect and communicate …

[图书][B] The Influence of Mobile Technology Advancements on Digital Forensics Investigations Practices and Procedures: A Generic Qualitative Inquiry

ED Ward - 2021 - search.proquest.com
The purpose of the generic qualitative inquiry was to explore how digital forensics
investigators (DFIs) are applying improvised practices and procedures to consistently extract …

[PDF][PDF] Протокол идентификации устройств Интернета вещей методом деградированной флэш-памяти

СС Владимиров, ДМ Берестовой - Информационные технологии и …, 2020 - sut.ru
Предмет исследования. Статья представляет разработанный авторами протокол
идентификации устройств Интернета вещей и результаты его тестирования. Метод …

Sensor-based identification to detect counterfeit smartphones using Blockchain

AM Almuhaideb, SJ Alsunaidi - Journal of Ambient Intelligence and …, 2023 - Springer
The rapid growth of the technology sector and the increasing need to own smartphones
contributed to the increase in the rate of smartphones theft, as well as the sale of counterfeit …