Advances in Internet of Things

Advances in Internet of Things

ISSN Print: 2161-6817
ISSN Online: 2161-6825
www.scirp.org/journal/ait
E-mail: ait@scirp.org
"Cyber-Physical-Social Based Security Architecture for Future Internet of Things"
written by Huansheng Ning, Hong Liu,
published by Advances in Internet of Things, Vol.2 No.1, 2012
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Protocolos M2M para Ambientes Limitados no Contexto do IoT: Uma Comparação de Abordagens
[2] Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets
Sensors, 2022
[3] Trustworthy Machine Learning for Cloud-Based Internet of Things (IoT)
Transforming Management with AI, Big-Data …, 2022
[4] Proactive Detection of Attacks on APCS Accounts Based on Analysis of User Identification Graphical Attributes
2022 International …, 2022
[5] Security Challenges Prospective Measures In The Current Status of Internet of Things (IoT)
… International Conference on Connected Systems & …, 2022
[6] Methods to secure access control and encryption based on physical unclonable function
2022
[7] A Novel Bi-Key Computational Algorithm for Secure Data Transmission in Smart Meter Environment
Recent Advances in Computer Science …, 2022
[8] Privacy Preserving Internet of Things (IoT) Forensics
2022
[9] IoT Based Design of an Intelligent Light System Using CoAP
… Conference on Artificial Intelligence and Sustainable …, 2021
[10] A Cyber-Physical Data Management and Analytics System (CP-DMAS) for Smart Factories
2021
[11] Research on Battery Monitoring Technology Based on Internet of Things
2021 International Conference on Signal Processing …, 2021
[12] Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks
2021 IEEE SmartWorld …, 2021
[13] Formation of a Digital Footprint Based on the Characteristics of Computer Hardware to Identity APCS Users
2021 International …, 2021
[14] The Ethics of Psychological Artificial Intelligence: Clinical Considerations
Counseling and Values, 2021
[15] Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm
Journal of Experimental & Theoretical Artificial …, 2021
[16] Digital Twin (DT) in Smart Energy Systems-Systematic Literature Review of DT as a growing solution for Energy Internet of the Things (EIoT)
E3S Web of Conferences, 2021
[17] Role and applications of IoT in materials and manufacturing industries–Review
2021
[18] A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability
Materials Today …, 2021
[19] Evolution of Internet of Things from blockchain to IOTA: A survey
IEEE …, 2021
[20] Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey
Sensors, 2021
[21] Survey of DoS/DDoS attacks in IoT
2021
[22] A Review on the Security of the Internet of Things: Challenges and Solutions
2021
[23] A geographic routing protocol based on trunk line in VANETs
2021
[24] Improved IPv6 sphuTikA process in 6LoWPAN base IOT network
2020
[25] ANALYZING COLLEGE STUDENTS'PRE-KNOWLEDGE AND POST-KNOWLEDGE OF EMBEDDED SOFTWARE SECURITY AND ITS IMPACT TOWARDS …
2020
[26] Privacy Challenges and Their Solutions in IoT
2020
[27] Characteristics and Challenges of the Internet of Things in Entrepreneurship
2020
[28] Cyber Physical System: Achievements and challenges
2020
[29] Security and privacy issues of physical objects in the IoT: challenges and opportunities
2020
[30] Proposed framework of smart transportation in Pakistan: issues, challenges, vulnerabilities, and solutions
2020
[31] Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study.
ICISSP, 2020
[32] The Proficient Context-Aware QoS framework for Reliable Web of Things
2020
[33] IoT Architecture
2020
[34] Cyberentity and its consistency in the cyber-physical-social-thinking hyperspace
2020
[35] A Survey on Architecture, Protocols and Challenges in IoT
2020
[36] Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research
2020
[37] A Survey of Voice Pathology Surveillance Systems Based on Internet of Things and Machine Learning Algorithms
2020
[38] IOT BASED BLOCKCHAIN SOLUTION: COVID-19 AND DEFENSE
2019
[39] Use of 5G Network and Standardization of Frameworks to Enhance Security of IoT Systems
2019
[40] Access Control for Physical Objects in Internet of Things
2019
[41] Preserving Privacy in Cyber-physical-social Systems: An Anonymity and Access Control Approach
2019
[42] Improving Access to Science for Social Good
2019
[43] Energy Efficient Service Embedding In IoT over PON
2019
[44] Resilience for Smart Water Systems
2019
[45] IOTA Viability In Healthcare Industry
2019
[46] Emerging Pyroelectric Nanogenerators to Convert Thermal Energy into Electrical Energy
2019
[47] A Survey of Security Issues in Internet of Things
2019
[48] CPG-FS: A CPU Performance Graph Based Device Fingerprint Scheme for Devices Identification and Authentication
2019
[49] Internet of Things and it's Challenges
2019
[50] Computer network security technology based on artificial intelligence
2019
[51] Potential Development of AES 128-bit Key Generation for LoRaWAN Security
2019
[52] Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges
2019
[53] Internet of Things: Security Challenges and Its Future Direction
2019
[54] COSMOS: Collaborative, Seamless and Adaptive Sentinel for the Internet of Things
2019
[55] Low-Power AES Data Encryption Architecture for a LoRaWAN
2019
[56] FUTURE INTERNET OF THINGS AND IT'S CHALLENGES
International Journal For Recent Developments in Science & Technology, 2019
[57] CATSWoTS: Context Aware Trustworthy Social Web of Things System
2019
[58] An approach to develop the smart health using Internet of Things and authentication based on biometric technology
Future Generation Computer Systems, 2019
[59] Key Technology for Intelligent Interaction Based on Internet of Things
2019
[60] Intrusion detection systems in the Internet of things: A comprehensive investigation
2019
[61] Managing Cybersecurity Risks of SCADA Networks of Critical Infrastructures in the IoT Environment
2019
[62] Hybrid Energy Harvesters: Toward Sustainable Energy Harvesting
2019
[63] Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey
2019
[64] A Chaotic Cryptographic Solution for Low-Range Wireless Communications in Industry 4.0
2019
[65] LoRaWAN 物聯網之低功耗資料加密方法
2019
[66] Um estudo e avaliação do desempenho de Protocolos de Aplicação para a Internet das Coisas
2019
[67] A Privacy Aware Architecture for IoT Enabled Systems
2019
[68] A Web of Things Architecture Focusing on Trust
2019
[69] DoS and DDoS vulnerability of IoT: A review
2019
[70] FRAMEWORK FOR BUSINESS VALUE OF SOCIAL INTERNET OF THINGS
2019
[71] Service embedding in IoT networks
2019
[72] TÜRK LOJİSTİK FİRMALARINDAN BİRİNDE ENDÜSTRİ 4.0'A GEÇİŞ
2018
[73] Smart Surveillance Using Internet of Things
2018
[74] A Survey on Internet of Things
2018
[75] TRIS: A Three-Rings IoT Sentinel to Protect Against Cyber-Threats
2018
[76] Modified and Improved IPv6 Header Compression (MIHC) Scheme for 6LoWPAN
Wireless Personal Communications, 2018
[77] Literature review of Industry 4.0 and related technologies
Journal of Intelligent Manufacturing, 2018
[78] Securing the internet of things in the age of machine learning and software-defined networking
2018
[79] AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments
2018
[80] Development of a Secure, Heterogeneous Cloud Robotics Infrastructure: Implementing a Mesh VPN and Robotic File System Security Practices
2018
[81] IoT Cyber Security—A Discourse on the Human Dimension
Internet of Things, for Things, and by Things (pp. 221-228), 2018
[82] Security in Internet of Things: Issues, Challenges and Solutions
Recent Trends in Data Science and Soft Computing, 2018
[83] Cyberintelligence for IoT
2018
[84] Securing the Internet of Things: New Perspectives and Research Challenges
2018
[85] An Insight into Current IoT Security Methods
2018
[86] Ontology-Based Personalized Telehealth Scheme in Cloud Computing
Web Services – ICWS 2018, 2018
[87] Trust management for SOA based social WoT system
2018
[88] THE TRANSITION TO INDUSTRY 4.0 IN ONE OF THE TURKISH LOGISTICS COMPANY
INTERNATIONAL JOURNAL OF 3D PRINTING TECHNOLOGIES AND DIGITAL INDUSTRY, 2018
[89] Iiot and big data in industry 4.0: gather, display and evaluate data
2018
[90] Security Analysis of RPL Protocol
2018
[91] Internet of Things, for Things, and by Things
2018
[92] INTERNET OF THING (IoT): AN OVERVIWE BASED ON SECURITY CHALLENGE
2018
[93] Internet of Things Applications@ Urban Spaces (Tel Aviv Smart City: A Case Study)
Information and Communication Technology for Sustainable Development, 2018
[94] Internet of Things (IoT): Research, Architectures and Applications
2018
[95] Implementation of Cyber-Physical Production Systems for Quality Prediction and Operation Control in Metal Casting
Sensors, 2018
[96] Secure IoT: An Improbable Reality
2017
[97] A study of the Internet of Things in the oil and gas industry
2017
[98] Security Management perspective for Internet of Things
International Journal of Engineering Science Invention, 2017
[99] SECURITY AND PRIVACY OF CYBER PHYSICAL SYSTEMS IN IOT USING CLOUD INFRASTRUCTURE
2017
[100] A Novel Bagging C4. 5 Algorithm Based on Wrapper Feature Selection for Supporting Wise Clinical Decision Making
Journal of Biomedical Informatics, 2017
[101] Protection of enterprise resources: A novel security framework
2017
[102] Nesnelerin İnternetinin Kişisel, Kurumsal ve Ulusal BilgiGüvenliği Açısından İncelenmesi Examination of Internet of Things in Terms of Personal, Enterprise and National Information Security
TÜRKİYE BİLİŞİM VAKFI BİLGİSAYAR BİLİMLERİ VE MÜHENDİSLİĞİ DERGİSİ, 2017
[103] Nesnelerin İnternetinin Kişisel, Kurumsal ve Ulusal Bilgi Güvenliği Açısından İncelenmesi
TBV Journal of Computer Science and Engineering, 2017
[104] Development of Android/IOS Based Application to Access Aadhar Database For Utilization In General Elections-Aadhar Based Electoral Application
International e-Journal For Science And Research, 2017
[105] Swarm Intelligence via the Internet of Things and the Phenomenological Turn
Philosophies, 2017
[106] Utilizing the Internet of Things (IoT) Technologies in the Implementation of Industry 4.0
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, 2017
[107] A review of the smart world
Future Generation Computer Systems, 2017
[108] Low Cost Internet of Things Approach for Security Surveillance Using Raspberry-Pi
2017
[109] Enhancing the security of IoT enabled robotics: Protecting TurtleBot file system and communication
2017
[110] Security Issues and Its Countermeasures in Examining the Cloud-Assisted IoT
2017
[111] Co-engineering safety and security in risk-prone smart work environments
2017
[112] A Triangular NodeTrix Visualization Interface for Overlapping Social Community Structures of Cyber-Physical-Social Systems in Smart Factories
2017
[113] Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
Future Generation Computer Systems, 2017
[114] System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems
ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on LCETES 2015, Special Issue on ACSD 2015 and Special Issue on Embedded Devise Forensics and Security, 2017
[115] An INTERNET of THINGS APPROACH for SECURITY SURVEILLANCE using RASPBERRY-PI–A Survey
International Research Journal of Engineering and Technology, 2017
[116] A Flexible Wildcard-Pattern Matching Accelerator via Simultaneous Discrete Finite Automata
2017
[117] Internet of things security
2017
[118] IoT Security Adoption into Business Processes: A Socio-Technical View
2017
[119] A Systematic Literature Review on the Security Challenges of Internet of Things and their Classification
2017
[120] Dynamic network configuration in the Internet of Things
2017
[121] Securing the Internet of Things
Fog for 5G and IoT, 2017
[122] An Adaptable, Fog-Computing Machine-to-Machine Internet of Things Communication Framework
Dissertation, Case Western Reserve University, 2017
[123] Internet of Things Approach for Motion Detection and Motion Tracking Using Raspberry Pi, Pir Sensor and Dropbox
2017
[124] A effective Encryption with Resource Optimization on Multimedia Files for Security
International Journal for Research in Engineering Application & Management, 2017
[125] 11 Securing the Internet of Things: Need for Fog Computing
2017
[126] Secure IoT: An Improbable Reality.
2017
[127] Internet of Things based and FACE based Authentication using RASPBERRY-PI on Open-Source Platform
2017
[128] CYBER-SECURITY RELATED COSTS IN THE INTERNET OF THINGS ERA
International Conference on Management and Industrial Engineering, 2017
[129] A review on security problems and measures of Internet of Things
2017
[130] Securing the Internet of Things: Need for a New Paradigm and Fog Computing
Fog for 5G and IoT, 2017
[131] Attribute Based Encryption—A Data Centric Approach for Securing Internet of Things (IoT)
Advanced Science Letters, 2017
[132] Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things
2017
[133] THE RISE OF INTERNET OF THING AND THE RISK OF THREATS
2017
[134] Fog for 5G and IoT
2017
[135] Towards Distributed and Context-Aware Human-Centric Cyber-Physical Systems
Advances in Service-Oriented and Cloud Computing, 2016
[136] An IOT Based Motion Detection using Raspberry PI
i-manager's Journal on Cloud Computing, 2016
[137] 6LOWPAN HEADER COMPRESSES WITH END-TO-END HYBRID ROUTE-OVER USING CROSS-LAYER AND ADAPTIVE BACKOFF EXPONENT
2016
[138] Cryptography Arbitration: Security Complexities of Cloud Enabled IoT in Europe and Beyond.
2016
[139] A Video Sensing Oriented Format-compliant Entropy Coding Encryption Scheme and Embedded Video Processing System
2016
[140] A survey on Internet of Things architectures
Journal of King Saud University - Computer and Information Sciences, 2016
[141] Evolving authentication design considerations for the internet of biometric things (IoBT)
2016
[142] A light weight and secure video conferencing scheme utilizing public network
Multimedia Tools and Applications, 2016
[143] Pick a right puppy from a litter, toward a secure controller framework in physical, human and cyber triad
2016
[144] Secure IoT framework and 2D architecture for End-To-End security
The Journal of Supercomputing, 2016
[145] Survey of Real-time Processing Technologies of IoT Data Streams
Journal of Information Processing, 2016
[146] Big Data Approach in an ICT Agriculture Application
New Approaches in Intelligent Control, 2016
[147] A survey: Cyber-physical-social systems and their system-level design methodology
Future Generation Computer Systems, 2016
[148] Το διαδίκτυο των πραγμάτων και οι εφαρμογές του
2016
[149] A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints
2016
[150] Research Studies on the Agricultural and Commercial Field
Advanced Applied Informatics (IIAI-AAI), 2015 IIAI 4th International Congress on, 2015
[151] Towards Collaborative Human-Centric CPS
2015
[152] 基于 PKI 和 CPK 的 RFID 系统混合密钥管理机制研究
电子科技大学学报, 2015
[153] 'Things' in the Internet of Things: Towards a Definition
International Journal of Internet of Things, 2015
[154] An Internet of things approach for motion detection using Raspberry Pi
Intelligent Computing and Internet of Things (ICIT), 2014 International Conference on, 2015
[155] FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things
2015
[156] Securing the Internet of Things with Responsive Artificial Immune Systems
Proceedings of the 2015 on Genetic and Evolutionary Computation Conference, 2015
[157] A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft
Journal of Network and Computer Applications, 2015
[158] Internet of Things (IoT): Definitions, Challenges and Recent Research Directions
2015
[159] Prevent Malicious Controller in a Physical, Human and Cyber Triad
2015
[160] AUTOMAÇÃO NA INDÚSTRIA METALURGICA E DE MINERAÇÃO COM RFID: UMA REVISÃO INTEGRATIVA
2015
[161] Poster: Toward a secure controller framework for flight in physical human and cyber triad
2015
[162] 基于环境感知的防泄漏多秘密共享方案
2015
[163] 网络化信息系统体系对抗试验环境安全性结构
指挥信息系统与技术, 2015
[164] 物联网技术及安全问题
上海理工大学学报: 社会科学版, 2015
[165] Things' in the internet of things: towards a definition
2015
[166] Research on Intelligent Regulation of Ship-to-Ship Crude Oil Transfer at Sea Based on Internet of Things
2014
[167] Internet of Things: The Argument for Smart Forensics
2014
[168] Future Internet of Things: open issues and challenges
Wireless Networks, 2014
[169] A Study of Smart Grid Communication Architecture
Proceedings of International Conference on Computer Science and Information Technology, 2014
[170] Big data application to the vegetable production and distribution system
Signal Processing & its Applications (CSPA), 2014 IEEE 10th International Colloquium on, 2014
[171] Adaptive Security for the Internet of Things Reference Model
Norsk informasjonssikkerhetskonferanse (NISK), 2014
[172] Embedded Micro Application Server in Intel Mini-ITX DN2800MT for Interaction with the ARM Cortex-M3
2014
[173] IoT-security Approach Analysis for the Novel Nutrition-Based Vegetable Production and Distribution System
Advanced Applied Informatics (IIAIAAI), 2014 IIAI 3rd International Conference on, 2014
[174] A security communication model based on certificateless online/offline signcryption for Internet of Things
Security and Communication Networks, 2014
[175] What the Design Theory of Social-Cyber-Physical Systems Must Describe, Explain and Predict?
An Anthology of Theories and Models of Design, 2014
[176] Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design
arXiv preprint arXiv:1401.6375, 2014
[177] 一种基于谱聚类分析的物联网节点安全控制域划分算法
传感技术学报, 2014
[178] A video sensing oriented speed adjustable fast multimedia encryption scheme and embedded system
Computing, Communications and IT Applications Conference (ComComAp), 2014 IEEE, 2014
[179] A speed adjustable scheme based selective encryption control model for large-scale multimedia sensing system under resources constraints
Computing, Communications and IT Applications Conference (ComComAp), 2014 IEEE, 2014
[180] Design of complex event-processing IDS in internet of things
2014
[181] A New Approach to the Vegable Production and Distribution System
2014
[182] Unit and ubiquitous internet of things
2013
[183] Norwegian Information Security Conference Norsk Informasjonssikkerhetskonferanse
2013
[184] The Study and Application of the IoT in Pet Systems
Advances in Internet of Things, 2013
[185] A Survey on the Internet of Things Security
Computational Intelligence and Security (CIS), 2013 9th International Conference on, 2013
[186] A Network Storage Framework for Internet of Things
Procedia Computer Science, 2013
[187] The Regulation of Ship-to-Ship Crude Oil Transfer at Sea: Is There A Need for an Intelligent Monitoring System?
Journal of Applied Sciences, 2013
[188] On the features and challenges of security and privacy in distributed internet of things
Computer Networks, 2013
[189] Finnish Perspectives for the IOT
American Journal of Networks and Communications, 2013
[190] Department of Computer and Communication Systems, Faculty of Engineering, Universiti Putra Malaysia, UPM Serdang, 43400 Selangor, Malaysia
Sensing Technology (ICST), 2013 Seventh International Conference on, 2013
[191] 基于物联网技术的海上原油过驳智慧监管研究
宁波大学学报: 理工版, 2013
[192] NIK 2013
2013
[193] Embedded Micro Application Server in Intel MinilTX DN2800MT for Interaction with the ARM Cortex-M3
2013
[194] The regulation of ship to ship crude oil transfer at sea: is there a need for an intelligent monitoring system
2013
[195] Towards a History–Based Authentication and Intrusion Detection Mechanism
2013
[196] 物联网安全关键技术及其应用研究
大庆师范学院学报, 2012
[197] Beyond advanced mechatronics: new design challenges of Social-Cyber-Physical systems
Proceedings of the ACCM-Workshop on ?Mechatronic Design, 2012
[198] Digital Communications and Networks
[199] A Selective Encryption and fraud detection on Multimedia Files for data security with Resource Optimization
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top