Searched for: %2520
(21 - 40 of 81)

Pages

Ultra-low-power Architecture for Wireless Internet of Things
Ultra-low-power Architecture for Wireless Internet of Things
NURSE: eNd-UseR IoT malware detection tool for Smart homEs
NURSE: eNd-UseR IoT malware detection tool for Smart homEs
Mitigating the Impacts of the Electric Vehicle Charging Infrastructure on Residential Grids
Mitigating the Impacts of the Electric Vehicle Charging Infrastructure on Residential Grids: Next Generation Grid Operations Knowledge Framework
Have you updated your lightbulb?
Have you updated your lightbulb?: Solving IoT vulnerabilities through governance
T-TRAIL: Preventing Decreased Rank Attacks in RPL-based IoT Networks
T-TRAIL: Preventing Decreased Rank Attacks in RPL-based IoT Networks
A Comparative Study on Signature Schemes for IoT Devices
A Comparative Study on Signature Schemes for IoT Devices
A Comparative Study of the TEA, XTEA, PRESENT and Simon lightweight cryptographic schemes
A Comparative Study of the TEA, XTEA, PRESENT and Simon lightweight cryptographic schemes
RPL Attack Analysis: Evaluation of a Cryptography-Based Sybil Defence in IEEE 802.15.4
RPL Attack Analysis: Evaluation of a Cryptography-Based Sybil Defence in IEEE 802.15.4
STIR: Preventing Routing Table Overload Attacks in RPL-based IoT Networks
STIR: Preventing Routing Table Overload Attacks in RPL-based IoT Networks
The performance of the routing protocol for low-power and lossy networks in mobile networks
The performance of the routing protocol for low-power and lossy networks in mobile networks
Blockchain-based DNS and PKI to solve issues of trust, security and censorship in the context of the IoT
Blockchain-based DNS and PKI to solve issues of trust, security and censorship in the context of the IoT
Blockchain-based frameworks for mitigating DDoS and Sybil attacks in the IoT
Blockchain-based frameworks for mitigating DDoS and Sybil attacks in the IoT
Improving data integrity and fault tolerance in IoT networks with Blockchain: on the search for suitable consensus mechanisms
Improving data integrity and fault tolerance in IoT networks with Blockchain: on the search for suitable consensus mechanisms
Understanding the Attackers and Victims in IoT-based DDoS attacks
Understanding the Attackers and Victims in IoT-based DDoS attacks: A mixed methodology approach to understanding cybercrime
Embedded Memory Security
Embedded Memory Security: Preventing hardware based attacks on the memory of IoT devices
A Visit to the Crime Scene
A Visit to the Crime Scene: Monitoring end-users during the remediation process of Mirai infected Internet of Things devices
Design of Midway Energy (Middleware System) as part of Illuminator
Design of Midway Energy (Middleware System) as part of Illuminator: Energy System Integration Development Tool Kit
From traditional agriculture to AgTech
From traditional agriculture to AgTech: Towards a Sustainable Business Model
The Giant Leap toward AIoT at Scale
The Giant Leap toward AIoT at Scale: Exploring the barriers to scaling Artificial Intelligence of Things
Recommendations for Improvement of the Building Design by Evaluating the Indoor Environmental Quality of the Pilot Floating House Project in Macabebe, the Philippines
Recommendations for Improvement of the Building Design by Evaluating the Indoor Environmental Quality of the Pilot Floating House Project in Macabebe, the Philippines: floating house, the Philippines
Searched for: %2520
(21 - 40 of 81)

Pages