TLS/PKI challenges and certificate pinning techniques for IoT and M2M secure communications

D Diaz-Sanchez, A Marín-Lopez… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Transport layer security (TLS) is becoming the de facto standard to provide end-to-end
security in the current Internet. IoT and M2M scenarios are not an exception since TLS is …

Büyük veri analizinde yapay zekâ ve makine öğrenmesi uygulamalari-artificial intelligence and machine learning applications in big data analysis

M Atalay, E Çelik - Mehmet Akif Ersoy Üniversitesi Sosyal Bilimler …, 2017 - dergipark.org.tr
Bilgi teknolojilerinde yüksek hızda yaşanan gelişmeler ve internet kullanımının çok yaygın
hale gelmesi ile birlikte, çeşitli platformlarda biriken verinin çeşitliliği ve hacmi de artmıştır …

[PDF][PDF] Performance refinement of convolutional neural network architectures for solving big data problems

S Aljaloud - Tikrit Journal of Pure Science, 2023 - iasj.net
Theano and TensorFlow, will be compared in this study for how well they perform on a given
problem. The MNIST database will be used for this specific problem, which is the recognition …

A novel monitoring solution for 6LoWPAN-based Wireless Sensor Networks

VH La, R Fuentes, AR Cavalli - 2016 22nd Asia-Pacific …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT) has emerged these last years as one of the most attractive subjects in
both the research community and the public. As a sub-domain, Wireless Sensor Networks …

Secure store and forward proxy for dynamic IoT applications over M2M networks

D Diaz-Sanchez, RS Sherratt… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT) applications are expected to generate a huge unforeseen amount of
traffic flowing from Consumer Electronics devices to the network. In order to overcome …

A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks

VH La, AR Cavalli - 2016 IEEE 36th International Conference …, 2016 - ieeexplore.ieee.org
In the current era, Wireless Sensor Networks (WSNs) and Internet of Things (IoT) have been
considered as two very attractive subjects in both industry and research community. The …

Management of low powered personal area networks using compression in SNMPv3

Y Turk, A Akman - … IEEE/ACS 15th International Conference on …, 2018 - ieeexplore.ieee.org
The internet of things (IoT) is being used more and more in our lives and this area attracts
interest in studying new methods. One of these methods is mesh networking technique …

Security monitoring for network protocols and applications

VH La - 2016 - theses.hal.science
Computer security, also known as cyber-security or IT security, is always an emerging topic
in computer science research. Because cyber attacks are growing in both volume and …

A Hybrid Approach to Ephemeral PKI Credentials Validation and Auditing

D Díaz-Sanchez, FA Mendoza, AM Lopez… - … Computing and Ambient …, 2022 - Springer
IoT/M2M solutions are expected to rely on near computing infrastructures for deployment of
services, frequently ephemeral, that will need adequate protection. Communication …

Cooperative algorithm for multi-agent foraging task based on modified hawk-dove game

Y Wang, J Liu, W Meng - 2007 International Conference on …, 2007 - ieeexplore.ieee.org
Multi-agent foraging is a popular benchmark to verify the effectiveness of different
cooperation algorithm. Markov game based approaches were wildly used although they …