Linked e-resources

Details

1. Opportunistic Multi-Modal User Authentication for Health-Tracking IoT Wearables
2. On-Phone CNN Model-based Implicit Authentication to Secure IoT Wearables
3. A Cybersecurity Guide for Using Fitness Devices
4. An efficient algorithm for human abnormal behaviour detection using object detection and pose estimation
5. A Secure and Scalable IoT Consensus Protocol
6. Session Key Agreement Protocol for Secure D2D Communication
7. What Do Your Smart-Home Devices Reveal About You?
8. A Quantum-Resistant and Fast Secure Boot for IoT Devices Using Hash-Based Signatures and SRAM PUFs
9. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment
10. Natural Scenes' Text Detection and Recognition using CNN and Pytesseract
11. Assessing the Resistance of Internet of Things Applications Against Memory Corruption Attacks: A Case Study for Contiki and Tizen
12. IoT geography chain: Blockchain based solution for Logistics eco system.

Browse Subjects

Show more subjects...

Statistics

from
to
Export