سبد خرید

نمایش یک نتیجه

A Survey of the Sensing, Communication, and Security Planes in Smart City System Design

0 از 5
0امتیاز
تومان
The Internet of Things (IoT) era is evolving into sensor initiated, actuation-driven, and machine intelligence-based decision making platform for smart cities. A smart city system aims at seamless and secure interconnection of sensors, actuators, and data processing resources to ensure digital, efficient,...

Framework for Managing Smart Cities Security and Privacy Applications

0 از 5
0امتیاز
تومان
The enormously growing population in urban areas and the impact it has on the urban environment escalates the need of sophisticated management approaches that acquire  the latest advancements of ICT, IoT and AI to enhance every city offered service. A smart city...

Secure integration of IoT and Cloud Computing

0 از 5
0امتیاز
تومان

Secure integration of IoT and Cloud Computing

0 از 5
0امتیاز
تومان
Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which...

Securing Multicast Group Communication in IoTEnabled Systems

0 از 5
0امتیاز
تومان
Current trend is being extended from the traditional Internet to the small, cheap, and low-power Internet of Things (IoT) in which the objects are being equipped with a device having computation and communication capabilities. As a result, all these objects can...

Securing Multicast Group Communication in IoTEnabled Systems

0 از 5
0امتیاز
تومان
Current trend is being extended from the traditional Internet to the small, cheap, and low-power Internet of Things (IoT) in which the objects are being equipped with a device having computation and communication capabilities. As a result, all these objects...

6LowPSec: An End-to-End Security Protocol for 6LoWPAN

0 از 5
0امتیاز
تومان
6LoWPAN has radically changed the IoT (Internet of Things) landscape by seeking to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication over IEEE 802.15.4 LoWPAN radio links requires high end-to-end security rules. The IEEE...

A Survey of Security and Privacy in Big Data

0 از 5
0امتیاز
تومان

A Survey of Security and Privacy in Big Data

0 از 5
0امتیاز
تومان
Big data has been arising a growing interest in both scientific and industrial fields for its potential value.  However, before employing big data technology into massive applications, a basic but also principle topic should be investigated: security and privacy. In...

An approach for the secure management of hybrid cloud–edge environments

0 از 5
0امتیاز
تومان
The Cloud-of-Things (CoT) paradigm is a challenging approach to manage IoT applications exploiting Cloud resources and services. In order to avoid latency in Cloud–IoT communications, the management of time- sensitive services has to be moved to the edge of the...

An approach for the secure management of hybrid cloud–edge environments

0 از 5
0امتیاز
تومان
The Cloud-of-Things (CoT) paradigm is a challenging approach to manage IoT applications exploiting Cloud resources and services. In order to avoid latency in Cloud–IoT communications, the  anagement of time-sensitive services has to be moved to the edge of the CoT. To this...
درحال بارگذاری ...