Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite

Linked e-resources

Details

Intro; Preface; Organization; Contents; New Generation of Smart Services; Proactive Context-Aware IoT-Enabled Waste Management; 1 Introduction; 2 Related Work; 3 ProAdaWM Context Modeling and Reasoning; 3.1 Context Model; 3.2 Context Reasoning; 4 ProAdaWM System Architecture; 5 Validation and Results; 5.1 Implementation; 5.2 Case Study; 5.3 Results and Discussion; 6 Conclusions and Future Work; References; Investigation of the IoT Device Lifetime with Secure Data Transmission; Abstract; 1 Introduction; 2 Review of Existing Approaches for Evaluation of the IoT Device Lifetime

3 Analysis of Requirements for Modern IoT Systems4 Estimation of Power Consumption and Lifetime of IoT Device; 5 Calculation of the IoT Device Lifetime Taking into Account the Time for Data Encryption and Decryption; 6 Calculation of the IoT Device Lifetime Using the Proposed Solution; 7 Conclusions; 8 Future Work; References; Compression Methods for Microclimate Data Based on Linear Approximation of Sensor Data; Abstract; 1 Introduction; 2 Lightweight Compression Methods for Sensor Data; 2.1 Lossy Methods and Lossless Methods; 2.2 Lossy Compression Algorithms Based on Linear Approximation

2.3 Transform Based Compression Methods3 Testing the Algorithms with Real Microclimate Data; 4 Conclusions and Future Work; References; An Open Multimodal Mobility Platform Based on Distributed Ledger Technology; Abstract; 1 Introduction; 2 Background; 2.1 Distributed Ledger Technology; 2.2 IOTA; 3 Multimodal Mobility Platform; 3.1 Mobility Platform Use Case; 3.2 Multi-channel Architecture; 3.3 Random Access Authenticated Messaging; 3.4 Seed Management; 4 Discussion and Conclusion; Acknowledgements; References; Semantic Interoperability in IoT: A Systematic Mapping; 1 Introduction

2 Background3 Research Method; 3.1 Selected Works; 4 Synthesis of Data and Discussion; 5 Conclusions; References; Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation; Abstract; 1 Introduction; 2 Related Works; 3 The Proposed Method; 3.1 Network Traffic Collection; 3.2 Traffic Visualisation; 3.3 Malware Traffic Analysis; 4 Experimental Result; 4.1 Experiment Setup; 4.2 Experiments Results and Analysis; 4.3 ASCII Characters Frequency Throughout Traffic Results and Analysis; 4.4 Comparison; 5 Conclusion; Acknowledgement

Browse Subjects

Show more subjects...

Statistics

from
to
Export