Searched for: subject:"IoT"
(1 - 20 of 111)

Pages

document
Su, Kevin (author)
To protect critical services in today's society it is necessary to mitigate and prevent risks threatening the reliability of the internet. Internet-of-Things (IoT) devices are the number one attack target on the internet. The situation will become worse as there will be an expected 40 billion IoT devices in 2025. IoT bot activity represented 78%...
master thesis 2021
document
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author)
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and...
journal article 2021
document
Feng, Y. (author), Duives, D.C. (author), Daamen, W. (author), Hoogendoorn, S.P. (author)
Collecting pedestrian behaviour data is vital to understand pedestrian behaviour. This systematic review of 145 studies aims to determine the capability of contemporary data collection methods in collecting different pedestrian behavioural data, identify research gaps and discuss the possibilities of using new technologies to study pedestrian...
review 2021
document
Kumar, Gulshan (author), Saha, Rahul (author), Lal, C. (author), Conti, Mauro (author)
Digital forensic in Internet-of-Thing (IoT) paradigm is critical due to its heterogeneity and lack of transparency of evidence processing. Moreover, cross-border legalization makes a hindrance in such process pertaining to the cloud forensic issues. This urges a forensic framework for IoT which provides distributed computing, decentralization...
journal article 2021
document
Okkerman, Hans (author)
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightweight devices with an internet connection have been integrated into many aspects of daily life; from consumer products to industrial processes and from medical applications to critical infrastructures. Cisco predicts that by 2023, more than half of...
master thesis 2020
document
Chittur Ramasubramaniam, Subbaraman (author)
The usage of Industry 4.0 technologies isgaining a lot of popularity in the context of manufacturing industries. Theyoffer improvements to the traditional manufacturing environment by offeringmore connectivity and integration in the business processes. Many companies aremoving towards these technologies to harness these...
master thesis 2020
document
Bouwmeester, Brennen (author)
The increasingly important availability of online services is constantly threatened by malicious software such as botnets. Attackers have gained power through devices that are part of the rising Internet of Things (IoT), mostly through infections caused by Mirai. The botnets created by Mirai are used for the purpose of DDoS attacks, which can...
master thesis 2020
document
Trichy Siva Raman, S.K. (author)
Using the energy system is part of our daily routine but the complexity of power systems and its understanding have both been confined to the experts in the field. Furthermore, the advent of the Information and Communication Technology (ICT) and the Internet of Things (IoT), power system integration is becoming even more complex for the system...
master thesis 2020
document
Stoccuto, Stefania (author)
Agriculture is a fundamental element of every economy. However, global issues such as climate change, land deterioration, and a continuously growing population are strongly impacting the sector. It is estimated that by 2050 the population will increase by two billion, reaching 9 billion people to be fed. In the past 34 years, researchers...
master thesis 2020
document
Verduijn, I.N. (author)
Legionella is a serious thread to public health. For a lot of facilities, obligated water safety plans need to be executed to minimise the chances of a legionellosis outbreak. Unfortunately, these water safety plans are not always executed properly. <br/>With the stoppage sensor of Octo Facility Management, there is an opportunity to create a...
master thesis 2020
document
Kuğuoğlu, Kaan (author)
The powerful convergence of AI and the Internet of Things (IoT), or Artificial Intelligence of Things (AIoT) in short, is no longer on the horizon; it has already arrived. By combining AI’s ability to quickly wring insights from data and the ever-growing network of connected devices and systems that generate data, companies can avoid unplanned...
master thesis 2020
document
Benoy, Reji (author)
This thesis aims to provide passive design recommendations to improve the design quality of low income houses in the Philippines, by evaluating the indoor environmental quality of the pilot floating house project. The pilot project is the result of researches carried out by Pieter Ham and Joran Van Schaik to find a solution for the housing...
master thesis 2020
document
Agrawal, Niket (author)
Edge computing extends the cloud computing capabilities to the edge of the network to facilitate processing of the data in the close proximity of its generation. It augments the deployment of several applications in the Internet of Things (IoT) domain which demand low latency and near real-time response for their reliable operation. However, the...
master thesis 2020
document
Rosema, Yann (author)
In the Dutch motorway traffic management (MTM) system used by Rijkswaterstaat, a central system and multiple outstations alongside the road communicate with each other to keep highways safe. This makes the MTM system a form of distributed flow control system. However, Rijkswaterstaat faces 2 problems with regards to traffic control: the control...
master thesis 2020
document
Ho-Sam-Sooi, Nick (author)
Given the significant privacy and security risks of IoT devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account when purchasing these devices. In order to support this goal, this study has examined the effect of security and privacy on IoT device purchase behaviour and assessed whether...
master thesis 2020
document
Lazaridis, Lazaros (author)
As software security expert Bruce Schneier argues, the pervasive vulnerability of embedded systems today is structurally similar to the security crisis of PCs in the mid-1990s—only much worse. Embedded devices are ideal malware targets for several reasons. Firstly, Internet-connected devices are inherently more exposed to remote exploitation....
master thesis 2020
document
Hafeez, Ibbad (author), Antikainen, Markku (author), Ding, Aaron Yi (author), Tarkoma, Sasu (author)
IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In addition, resource constraints and heterogeneity of IoT devices make it impractical to secure IoT installations using traditional endpoint and network security solutions. To address this problem, we present IoT-Keeper, a lightweight system which...
journal article 2020
document
Li, Yuhong (author), Su, Xiang (author), Ding, Aaron Yi (author), Lindgren, Anders (author), Liu, Xiaoli (author), Prehofer, Christian (author), Riekki, Jukka (author), Rahmani, Rahim (author), Tarkoma, Sasu (author), Hui, Pan (author)
The Internet of Things (IoT) connects smart devices to enable various intelligent services. The deployment of IoT encounters several challenges, such as difficulties in controlling and managing IoT applications and networks, problems in programming existing IoT devices, long service provisioning time, underused resources, as well as...
review 2020
document
Shiferaw, Yonatan (author), Arora, Apoorva (author), Kuipers, F.A. (author)
LoRaWAN has emerged as a popular IoT commu- nications technology. It comes with three classes of operation: A, B, and C. Although many IoT use-cases, like Firmware-over- the-Air updates, require multicast, Class A cannot be used for that purpose. Class C can, but consumes a lot of energy. This leaves Class B. In this paper, we investigate Class...
conference paper 2020
document
Ferreras Chumillas, Pablo (author)
The recently introduced General Data Protection Regulation (GDPR) allows universities to use WiFi Access data for their research activities. The richness, ubiquity, and scalability of WiFi tracking make it an extremely relevant resource for studying the behavior and mobility patterns of groups and social systems. However, it is also a sensitive...
master thesis 2019
Searched for: subject:"IoT"
(1 - 20 of 111)

Pages