Your selections:
Priority based and secured traffic management system for emergency vehicle using IoT
The current and future role of smart street furniture in smart cities
- Nassar, Mohamed, Luxford, Len, Cole, Peter, Oatley, Giles, Koutsakis, Polychronis
Cyber attacks in mechatronics systems based on Internet of Things
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
The rise of ransomware and emerging security challenges in the internet of things
- Yaqoob, Ibrar, Ahmed, Ejaz, Rehman, Muhammad, Ahmed, Abdelmuttlib, Imran, Muhammad
Cloud based secure service providing for IoTs using blockchain
- Rehman, Mubariz, Javaid, Nadeem, Awais, Muhammad, Imran, Muhammad, Naseer, Nidal
- Sahraoui, Yesin, Kerrache, Chaker, Amadeo, Marica, Vegni, Anna, Korichi, Ahmed, Nebhen, Jamel, Imran, Muhammad
Cybersecurity risks in meat processing plant and impacts on total productive maintenance
- Chundhoo, Vickram, Chattopadhyay, Gopinath, Karmakar, Gour, Appuhamillage, Gayan
- Rafique, Wajid, Qi, Lianyong, Yaqoob, Ibrar, Imran, Muhammad, Rasool, Raojan, Dou, Wanchun
The role of big data analytics in internet of things
- Ahmed, Ejaz, Yaqoob, Ibrar, Hashem, Ibrahim, Khan, Imran, Imran, Muhammad
- Wadud, Md Anwar, Amir-Ul-Haque Bhuiyan, T., Uddin, Md Ashraf, Rahman, Md Motiur
Security challenges and solutions for 5G HetNet
- Sharma, Aakanksha, Balasubramanian, Venki, Jolfaei, Alireza
A survey on big multimedia data processing and management in smart cities
- Usman, Muhammad, Jan, Mian, He, Xiangjian, Chen, Jinjun
An AI-enabled lightweight data fusion and load optimization approach for internet of things
- Jan, Mian, Zakarya, Muhammad, Khan, Muhammad, Mastorakis, Spyridon, Balasubramanian, Venki
Perception layer security in internet of things
- Khattak, Hasan, Shah, Munam, Khan, Sangeen, Ali, Ihsan, Imran, Muhammad
Artificial noise aided scheme to secure UAV-assisted internet of things with wireless power transfer
- Wang, Qubeijian, Dai, Hong-Ning, Li, Xuran, Shukla, Mahendra, Imran, Muhammad
- Han, Tao, Jan, Syed Rooh Ullah, Tan, Zhiyuan, Usman, Muhammad, Jan, Mian Ahmad, Khan, Rahim, Xu, Yongzhao
Metric learning-based few-shot malicious node detection for IoT backhaul/fronthaul networks
- Zhou, Ke, Lin, Xi, Wu, Jun, Bashir, Ali, Li, Jianhua, Imran, Muhammad
Security of Internet of Things devices : ethical hacking a drone and its mitigation strategies
- Karmakar, Gour, Petty, Mark, Ahmed, Hassan, Das, Rajkumar, Kamruzzaman, Joarder
- Patwary, Abdullah Al-Noman, Naha, Ranesh Kumar, Garg, Saurabh, Battula, Sudheer Kumar, Patwary, Md Anwarul Kaium, Aghasian, Erfan, Amin, Muhammad Bilal, Mahanti, Aniket, Gong, Mingwei
Are you sure you would like to clear your session, including search history and login status?