A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Review on Internet of Things (IoT): Security Challenges, Issuesand the Countermeasures approaches
2021
Psychology (Savannah, Ga.)
This study has detailed review of IoT layered design, each of these layers having lot of security challenges such as threats, vulnerabilities and attacks. ...
In the present scenario, Internet of Things is playing vital role in the next era of communication. ...
The
proposed security framework assists in the identification,
recovery and defense of threats to IoT infrastructure. ...
doi:10.17762/pae.v58i2.3188
fatcat:bzgximmiazdjzh3iq2z4texjdi
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges
2020
IEEE Access
Motivated by these facts, in this paper, we explore the evolving vulnerabilities in IoT devices. We provide a state-of-the-art survey that addresses multiple dimensions of the IoT realm. ...
Subsequently, we explore the open-source tools and datasets for the proliferation in research and growth of IoT. ...
We have examined many such correlated surveys to find their contributions and illustrate how the present study progresses the state-of-the-art in terms of IoT security. ...
doi:10.1109/access.2020.3022842
fatcat:ifkplk2lsjhupkt4c42fovqpta
Santé numérique : quelques réflexions sur les modèles économiques et les questions posées à la régulation
[chapter]
2018
Santé, numérique et droit-s
, treatment, alleviation of or compensation for an injury or disability, -investigation, replacement or modification of the anatomy or of a physiological or pathological process or state, -providing information ...
by means of in vitro examination of specimens derived from the human body, including organ, blood and tissue donations, and which does not achieve its principal intended action by pharmacological, immunological ...
Communication
Contribuer à la mise en valeur des outils de qualité Des Best-Of sont régulièrement mis à la disposition des médias. ...
doi:10.4000/books.putc.4454
fatcat:l3y6efyhybc6zcdhpnm4ioniai
Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019
2019
The Journal of British Blockchain Association
The discovery of a recent botnet that was discovered to be cleaning up bad botnets was observed in the wild using Emercoin's distributed DNS implementation [17] . ...
Among them included the use of internet-of-things (IoT) to streamline infrastructure for trade information sharing, where NEDO operated in partnership with NTT Data. ...
Liew, "Hedge fund index investing examined," Journal of Portfolio Management, vol. 29, no. 2, p. 113, 2003 . [17] W. F. ...
doi:10.31585/jbba-2-2-(full)2019
fatcat:lsnv4wnuhvhpne33puatdc4p4e
Identity and identification
[chapter]
Identity and Identification in India
It covers four main areas: • An overview of the UK's forensic science landscape from the perspective of its users • The changing nature of crime (including cybercrime), examining how forensic science can ...
The first is the summary report of the Government Chief Scientific Adviser. This was developed as a result of seminars and the advice of the experts who provided the source of the evidence. ...
fashionably Enjoyable and Disposable) 2 . ...
doi:10.4324/9780203401934_chapter_1
fatcat:2yj6d5jpqveszil53hr6qiay4a
Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM), Summer Semester 2018
[article]
2018
development of the full potential of the IoT [13] . ...
REFERENCES[1] The mirai botnet: all about the latest malware ddos attack type. https: //www.corero.com/resources/ddos-attack-types/ mirai-botnet-ddos-attack.html. ...
doi:10.2313/net-2018-11-1
fatcat:bnh7d4o7pna4njsnu52zvjcsou