物联网(英文)最新文献

筛选
英文 中文
Leveraging Security Management with Low-Level System Monitoring and Visualization 利用低级系统监控和可视化的安全管理
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_30
Karlen Avogian, Basel Sababa, I. Dionysiou, H. Gjermundrød
{"title":"Leveraging Security Management with Low-Level System Monitoring and Visualization","authors":"Karlen Avogian, Basel Sababa, I. Dionysiou, H. Gjermundrød","doi":"10.1007/978-3-030-71017-0_30","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_30","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78450709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirements for IoT Forensic Models: A Review 物联网取证模型的要求:综述
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_25
Nawaf Almolhis, A. M. Alashjaee, M. Haney
{"title":"Requirements for IoT Forensic Models: A Review","authors":"Nawaf Almolhis, A. M. Alashjaee, M. Haney","doi":"10.1007/978-3-030-71017-0_25","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_25","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90998230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review of Identity Methods of Internet of Things (IOT) 物联网(IOT)身份识别方法综述
物联网(英文) Pub Date : 2021-01-01 DOI: 10.4236/ait.2021.114011
Sana Abdelaziz Bkheet, J. I. Agbinya
{"title":"A Review of Identity Methods of Internet of Things (IOT)","authors":"Sana Abdelaziz Bkheet, J. I. Agbinya","doi":"10.4236/ait.2021.114011","DOIUrl":"https://doi.org/10.4236/ait.2021.114011","url":null,"abstract":"The Internet of Things (IOT) is a recent technology originating from the field of sensor networks. It has received significant attention because it is involved in most aspects of our daily lives. The IOT vision makes objects of various kinds become part of the Internet by assigning each object a unique identifier, enabling objects to communicate with each other in the same or different environments. IOT can collect, process, and exchange data via a data communication network. There are many methods for identifying objects; some have existed since the beginning of IOT innovation, such as Radio Frequency Identification (RFID), Barcode/2D code, IP address, Electronic Product Codes (EPC), etc. Continuous development in IOT domain and the large number of objects connected to the Internet daily require an improved identification method to cope with the rapid development in this field. Many modern methods have been proposed recently, based on various technologies such as computer vision, fingerprinting, and machine learning. This paper introduces an overview of IOT and discusses its fundamental elements; it mainly focuses on identification of IOT which is considered the main part that the IOT systems rely on. The paper discusses the existing identification methods for IOT. Moreover, it provides a review of the modern identification methods proposed in recent literature.","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70487838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Unquantize: Overcoming Signal Quantization Effects in IoT Time Series Databases 非量化:克服物联网时间序列数据库中的信号量化效应
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_44
M. Gerdes, K. Gross, G. C. Wang
{"title":"Unquantize: Overcoming Signal Quantization Effects in IoT Time Series Databases","authors":"M. Gerdes, K. Gross, G. C. Wang","doi":"10.1007/978-3-030-71017-0_44","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_44","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77554915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model 基于数据库和扫描仪模型的指纹活性检测算法综述
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_4
Riley Kiefer, Ashok R. Patel
{"title":"A Comprehensive Survey on Fingerprint Liveness Detection Algorithms by Database and Scanner Model","authors":"Riley Kiefer, Ashok R. Patel","doi":"10.1007/978-3-030-71017-0_4","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_4","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79276312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Brief Review of Low-Power GPU Techniques 低功耗GPU技术综述
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_59
P. Sharma, H. Al-Asaad
{"title":"Brief Review of Low-Power GPU Techniques","authors":"P. Sharma, H. Al-Asaad","doi":"10.1007/978-3-030-71017-0_59","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_59","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76910736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Network Traffic Reduction Method for a Smart Dust IoT System by Sensor Clustering 基于传感器聚类的智能粉尘物联网系统网络流量减少方法
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_49
Joonsuu Park, Kee-Hyun Park
{"title":"A Network Traffic Reduction Method for a Smart Dust IoT System by Sensor Clustering","authors":"Joonsuu Park, Kee-Hyun Park","doi":"10.1007/978-3-030-71017-0_49","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_49","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76843203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review 组织网络安全成功因素:详尽的文献回顾
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_27
Nancy M. Poehlmann, Kevin Matthe Caramancion, Irem Tatar, Yueqi Li, M. Barati, Terry Merz
{"title":"The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review","authors":"Nancy M. Poehlmann, Kevin Matthe Caramancion, Irem Tatar, Yueqi Li, M. Barati, Terry Merz","doi":"10.1007/978-3-030-71017-0_27","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_27","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83156351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BumpChat: A Secure Mobile Communication System BumpChat:一个安全的移动通信系统
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_52
Brian Kammourieh, N. Majd, A. Hadaegh
{"title":"BumpChat: A Secure Mobile Communication System","authors":"Brian Kammourieh, N. Majd, A. Hadaegh","doi":"10.1007/978-3-030-71017-0_52","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_52","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89970389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Authentication Protocol for Drones in LTE Networks LTE网络中无人机安全认证协议
物联网(英文) Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-71017-0_2
Dayoung Kang, Gyuhong Lee, Jin-Young Choi
{"title":"Secure Authentication Protocol for Drones in LTE Networks","authors":"Dayoung Kang, Gyuhong Lee, Jin-Young Choi","doi":"10.1007/978-3-030-71017-0_2","DOIUrl":"https://doi.org/10.1007/978-3-030-71017-0_2","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77320521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信