D Minoli, B Occhiogrosso - Internet of Things, 2018 - Elsevier
The deployment of Internet of Things (IoT) results in an enlarged attack surface that requires end-to-end security mitigation. IoT applications range from mission-critical predicaments (eg …
Personalization, mobility, artificial intelligence, corporate life transferred to the online world— all these elements will shape all intelligent solutions, including those for cities in the future …
Within the context of the Smart City, the need for intelligent approaches to manage and coordinate the diverse range of supply and conversion technologies and demand …
P Calvo - Ethics and Information Technology, 2020 - Springer
Cities, such as industry or the universities, are immersed in a process of digital transformation generated by the possibility and technological convergence of the Internet of …
D Minoli, B Occhiogrosso - 2018 IEEE international smart cities …, 2018 - ieeexplore.ieee.org
Ultrawideband (UWB) technology provides relatively high throughput at short distances by utilizing low-power pulse transmission as a coexisting radio service in the C/X-band portion …
R Kant, S Sharma, V Vikas… - 2023 International …, 2023 - ieeexplore.ieee.org
Implementation of IoT domain invites tremendous attacking opportunities which demands end to–end security mechanism. Applications related to the domain of IoT varies from critical …
This paper aims to investigate the interlink between city sustainability development indicators and smart sustainable city indicators (SSCIs). While the sustainability …
The media access control (MAC) protocol is responsible for channel resource sharing and conflict management in the communication process in VANET, which is of great significance …
The transportation system has evolved into a complex cyber-physical system with the introduction of wireless communication and the emergence of connected travelers and …