Discover Internet of Things最新文献

筛选
英文 中文
Determining critical nodes in optimal cost attacks on networked infrastructures 确定网络基础设施最佳成本攻击中的关键节点
Discover Internet of Things Pub Date : 2024-01-18 DOI: 10.1007/s43926-023-00054-1
Ishfaq Ahmad, Addison Clark, Muhammad Ali, Hansheng Lei, David Ferris, Alex Aved
{"title":"Determining critical nodes in optimal cost attacks on networked infrastructures","authors":"Ishfaq Ahmad, Addison Clark, Muhammad Ali, Hansheng Lei, David Ferris, Alex Aved","doi":"10.1007/s43926-023-00054-1","DOIUrl":"https://doi.org/10.1007/s43926-023-00054-1","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of audio classification with MFCC and STFT features using machine learning techniques 利用机器学习技术对使用 MFCC 和 STFT 特征进行音频分类的比较分析
Discover Internet of Things Pub Date : 2024-01-03 DOI: 10.1007/s43926-023-00049-y
Mahendra Kumar Gourisaria, Rakshit Agrawal, Manoj Sahni, Pradeep Kumar Singh
{"title":"Comparative analysis of audio classification with MFCC and STFT features using machine learning techniques","authors":"Mahendra Kumar Gourisaria, Rakshit Agrawal, Manoj Sahni, Pradeep Kumar Singh","doi":"10.1007/s43926-023-00049-y","DOIUrl":"https://doi.org/10.1007/s43926-023-00049-y","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139389403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative image interpolation based reversible data hiding for secure communication 基于图像插值的创新型可逆数据隐藏技术,用于安全通信
Discover Internet of Things Pub Date : 2023-12-01 DOI: 10.1007/s43926-023-00050-5
Riya Punia, Aruna Malik, Samayveer Singh
{"title":"Innovative image interpolation based reversible data hiding for secure communication","authors":"Riya Punia, Aruna Malik, Samayveer Singh","doi":"10.1007/s43926-023-00050-5","DOIUrl":"https://doi.org/10.1007/s43926-023-00050-5","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138624760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP 迭代特征选择技术是否足够高效?使用 SHAP 进行勒索软件分类时 RFECV 特征选择技术的性能比较分析
Discover Internet of Things Pub Date : 2023-11-30 DOI: 10.1007/s43926-023-00053-2
Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy
{"title":"Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP","authors":"Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy","doi":"10.1007/s43926-023-00053-2","DOIUrl":"https://doi.org/10.1007/s43926-023-00053-2","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139198677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using a data driven approach for comprehensive Life Cycle Assessment and effective eco design of the Internet of Things: taking LoRa-based IoT systems as examples 使用数据驱动法对物联网进行全面的生命周期评估和有效的生态设计:以基于 LoRa 的物联网系统为例
Discover Internet of Things Pub Date : 2023-11-20 DOI: 10.1007/s43926-023-00051-4
Ernesto Quisbert-Trujillo, Panagiota Morfouli
{"title":"Using a data driven approach for comprehensive Life Cycle Assessment and effective eco design of the Internet of Things: taking LoRa-based IoT systems as examples","authors":"Ernesto Quisbert-Trujillo, Panagiota Morfouli","doi":"10.1007/s43926-023-00051-4","DOIUrl":"https://doi.org/10.1007/s43926-023-00051-4","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139258457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of things (IoT)-based on real-time and remote boiler fuel monitoring system: a case of Raha Beverages Company Limited, Arusha-Tanzania 基于物联网(IoT)的锅炉燃料实时远程监控系统:坦桑尼亚阿鲁沙拉哈饮料有限公司的案例
Discover Internet of Things Pub Date : 2023-11-20 DOI: 10.1007/s43926-023-00052-3
Boniface Ntambara, D. Nyambo, Andreas Solsbach
{"title":"Internet of things (IoT)-based on real-time and remote boiler fuel monitoring system: a case of Raha Beverages Company Limited, Arusha-Tanzania","authors":"Boniface Ntambara, D. Nyambo, Andreas Solsbach","doi":"10.1007/s43926-023-00052-3","DOIUrl":"https://doi.org/10.1007/s43926-023-00052-3","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139255642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interpolation-based reversible data hiding scheme for internet of things applications 物联网应用中基于插值的可逆数据隐藏方案
Discover Internet of Things Pub Date : 2023-11-09 DOI: 10.1007/s43926-023-00048-z
Riya Punia, Aruna Malik, Samayveer Singh
{"title":"An interpolation-based reversible data hiding scheme for internet of things applications","authors":"Riya Punia, Aruna Malik, Samayveer Singh","doi":"10.1007/s43926-023-00048-z","DOIUrl":"https://doi.org/10.1007/s43926-023-00048-z","url":null,"abstract":"Abstract The exponential growth of the Internet of Things (IoT) has led to an increased demand for secure and efficient data transmission methods. However, there is a tradeoff in the image quality and hiding capacity in the data hiding methods. Therefore, the maximum amount of data that could be stored in the image media is a difficult challenge while maintaining the image quality. Thus, to make the balance between the quality of the images and the embedding capacity, a novel interpolation-based revisable data hiding (RDH) approach is developed for IoT applications. The proposed interpolation technique takes the average of the root value for the product of two neighboring original pixel values and the third original pixel value. And for the central pixel, it takes an average of two interpolated pixels. By doing so, most of the original pixels are considered and the calculated interpolated pixel is much enhanced as its average value. Furthermore, the data hiding is performed in two stages. In the first stage, RSA is performed on the secret message, and then embedding is done based on which intensity range group. The experimental results indicate that the proposed technique enhanced the embedding capacity by 17.58% and produced 7.80% higher PSNR values for the test images as compared to the baseline methods.","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135240927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks 物联网研究综述嵌入式设备固件安全性:体系结构、提取技术和漏洞分析框架
Discover Internet of Things Pub Date : 2023-10-31 DOI: 10.1007/s43926-023-00045-2
Shahid Ul Haq, Yashwant Singh, Amit Sharma, Rahul Gupta, Dipak Gupta
{"title":"A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks","authors":"Shahid Ul Haq, Yashwant Singh, Amit Sharma, Rahul Gupta, Dipak Gupta","doi":"10.1007/s43926-023-00045-2","DOIUrl":"https://doi.org/10.1007/s43926-023-00045-2","url":null,"abstract":"Abstract IoT and Embedded devices grow at an exponential rate, however, without adequate security mechanisms in place. One of the key challenges in the cyber world is the security of these devices. One of the main reasons that these devices are active targets for large-scale cyber-attacks is a lack of security standards and thorough testing by manufacturers. Manufacturer-specific operating systems or firmware of various architectures and characteristics are typically included with these devices. However, due to a lack of security testing and/or late patching, the underlying firmware or operating systems are vulnerable to numerous types of vulnerabilities. Reverse engineering and in-depth research of the firmware is required to detect the vulnerabilities. In this paper, we've delved into various aspects of IoT and embedded devices. This includes a comprehensive survey on the architecture of firmware, techniques for firmware extraction, and state-of-the-art vulnerability analysis frameworks for the detection of vulnerabilities using various approaches like static, dynamic, and hybrid approaches. Furthermore, we’ve scrutinized the challenges of existing vulnerability analysis frameworks and proposed a novel framework to address these issues.","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135809205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces 物联网时代的连接:关于可重构智能表面的安全性、特性和限制因素
Discover Internet of Things Pub Date : 2023-10-19 DOI: 10.1007/s43926-023-00046-1
Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten
{"title":"Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces","authors":"Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten","doi":"10.1007/s43926-023-00046-1","DOIUrl":"https://doi.org/10.1007/s43926-023-00046-1","url":null,"abstract":"Abstract What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of particular significance, the (I)IoT itself is the source and recipient of various types of data. Within this, there are two main aspects that need to be considered: (i) the transmission of data with appropriate latency and reliability requirements, and (ii) the safeguarding of this data. Both requirements are taken into account during the development of the Sixth Generation (6G) Wireless Systems. This is conceived to deliver higher data rates, reduced cost deployment, and enhanced reliability while providing universal connectivity. Hence, to assist such a vast network domain, (new) 6G-enabling technologies are developed, which include Reconfigurable Intelligent Surfaces (RISs), that are capable of modifying and reconfiguring the wireless propagation channels. This work describes concepts on how security, in particular Physical Layer Security (PhySec) methods, can be supported by RISs. Furthermore, an effective impedance surface model is presented, allowing efficient simulation of beamsplitting and shaping properties of RISs. Finally, the applicability of the use cases is mentioned, with a particular focus on Visible Light Communication (VLC).","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135779421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification and security assessment of android apps android应用分类及安全评估
Discover Internet of Things Pub Date : 2023-10-16 DOI: 10.1007/s43926-023-00047-0
Eralda Caushaj, Vijayan Sugumaran
{"title":"Classification and security assessment of android apps","authors":"Eralda Caushaj, Vijayan Sugumaran","doi":"10.1007/s43926-023-00047-0","DOIUrl":"https://doi.org/10.1007/s43926-023-00047-0","url":null,"abstract":"Abstract Current mobile platforms pose many privacy risks for the users. Android applications (apps) request access to device resources and data, such as storage, GPS location, camera, microphone, SMS, phone identity, and network information. Legitimate mobile apps, advertisements (ads), and malware all require access to mobile resources and data to function properly. Therefore, it is difficult for the user to make informed decisions that effectively balance their privacy and app functionality. This study analyzes the Android application permissions, ad networks and the impact on end-user’s privacy. Dangerous combinations of app permissions, and ad networks are used as features in our prediction models to understand the behavior of apps. Our models have a high classification accuracy of 95.9% considering the imbalance in real life between benign and malicious apps. Our assumption that certain app permissions can be a potential threat to the privacy of end users is confirmed to be one of the most impactful features of our prediction models. Since our study considers the impact of ad networks and malware permissions, it will help end-users make more informed decision about the app permissions they grant and understand that the app permissions open doors to more vulnerabilities, and at some point, benign apps can behave maliciously.","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136112464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信