A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is
To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation ... Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. ... Informatics and Applied Optimization (CIAO) for their support. ...doi:10.1186/s42400-021-00077-7 fatcat:32nrdpgvkjg4ljjxc44rewc55y
A flow is a named entity that provides a handle on the network resources associated with a data stream in the same manner that a process ID [...] ... The difficulties in realizing effective service location and client mobility are the consequence of a network abstraction in which only endpoints may be named and messages travel only from point to point ... Mike Feeley also deserves thanks as the second reader on this work, his suggestions helped to clear up several sections. ...doi:10.14288/1.0051493 fatcat:3xhh66pqifa3ldbavid4hxmnnm
The IPFIX protocol is characterized by a push-protocol behavior and a template-based message design [19, 20] . ... In this dissertation a grouping concerning mobility of sensor nodes and gateway is performed, followed by a handful of available applications for each group. ... and Services'. ...doi:10.2313/net-2013-07-2 fatcat:ybzrln3ggngupkoga7j56jazzm
the aspects of managing geographical information and web services. ... The goal of the GEOProcessing 2012 conference was to bring together researchers from the academia and practitioners from the industry in order to address fundamentals of advances in geographic information ... participation in case studies on integrated systems over the last years. ...fatcat:4t6dzm6r4bhshnwyiuohnopige
The present work proposes a novel IoT-based architecture for predictive maintenance that consists of three primary nodes: namely, the vehicle node (VN), the server leader node (SLN), and the root node ... The SLN is responsible for managing a region of vehicles, and it performs more heavy-duty data storage, fleet-wide analytics, and networking. ... Other categories of data include, a) metadata, which is data about the equipment (for example, id, location, model, etc.), and b) business data, which describes the context the equipment is involved in ...doi:10.20381/ruor-24325 fatcat:dmwpvsqnrjhcdcdb4r6tezztqq