Zobrazeno 1 - 10
of 588
pro vyhledávání: '"device identification"'
Publikováno v:
工程科学学报, Vol 46, Iss 8, Pp 1446-1457 (2024)
As the Industrial Internet of Things rapidly evolves, enterprises are increasingly using a wide variety of web containers. However, this growing usage also magnifies the complexities associated with managing these assets, leading to a rise in network
Externí odkaz:
https://doaj.org/article/d12359df118249fc8947d79ac6ed6c90
Publikováno v:
PeerJ Computer Science, Vol 10, p e2145 (2024)
The Internet of Things (IoT) is becoming more prevalent in our daily lives. A recent industry report projected the global IoT market to be worth more than USD 4 trillion by 2032. To cope with the ever-increasing IoT devices in use, identifying and se
Externí odkaz:
https://doaj.org/article/09f306b77ae94677ae59720484766198
Publikováno v:
IEEE Access, Vol 12, Pp 149099-149114 (2024)
In recent years, the rapid growth of Internet of Things (IoT) devices has introduced significant security risks, emphasizing the need for effective IoT device management. Traditional device identification methods, such as traffic analysis and machine
Externí odkaz:
https://doaj.org/article/72e8f8a2afc64dea926f9b3c79329855
Publikováno v:
IEEE Access, Vol 12, Pp 126738-126753 (2024)
Federated Learning (FL) is a paradigm in distributed machine learning, which has gained significant attention in the recent years especially in the domain of Internet of Things. Federated Learning saves communication bandwidth when compared to centra
Externí odkaz:
https://doaj.org/article/7981c8c6d00d4c6c8b1e5af55771f80d
Publikováno v:
IEEE Access, Vol 12, Pp 121822-121836 (2024)
Source Device Identification (SDI) is pivotal in multimedia forensics, as it entails the recognition of the device that captured a specific image or video. This paper introduces an innovative SDI method using log-Mel spectrograms from video audio, em
Externí odkaz:
https://doaj.org/article/c5051aca414944058a69f763aae61294
Publikováno v:
Applied Sciences, Vol 14, Iss 17, p 7954 (2024)
With the rapid development of the Internet of Things (IoT) technology, the number and types of devices accessing the Internet are increasing, leading to increased network security problems such as hacker attacks and botnets. Usually, these attacks ar
Externí odkaz:
https://doaj.org/article/560e1b611c0b40808a7fc07c652441fc
Publikováno v:
Symmetry, Vol 16, Iss 7, p 846 (2024)
Unauthenticated device access to a network presents substantial security risks. To address the challenges of access and identification for a vast number of devices with diverse functions in the era of the Internet of things (IoT), we propose an IoT d
Externí odkaz:
https://doaj.org/article/9aea62d11cbe46c88f799dbcaac10111
Publikováno v:
Sensors, Vol 24, Iss 13, p 4411 (2024)
LoRa enables long-range communication for Internet of Things (IoT) devices, especially those with limited resources and low power requirements. Consequently, LoRa has emerged as a popular choice for numerous IoT applications. However, the security of
Externí odkaz:
https://doaj.org/article/40b1404161974aacbd726f53c228873b
Publikováno v:
PeerJ Computer Science, Vol 10, p e1834 (2024)
Identification of the Internet of Things (IoT) devices has become an essential part of network management to secure the privacy of smart homes and offices. With its wide adoption in the current era, IoT has facilitated the modern age in many ways. Ho
Externí odkaz:
https://doaj.org/article/acea0735e9a44f5dbaec780cec3f68cb
Publikováno v:
Applied Sciences, Vol 14, Iss 11, p 4741 (2024)
The Internet of Things (IoT) is rapidly transforming our lives and work, enabling a wide range of emerging services and applications. However, as the scale of the IoT expands, its security issues are becoming increasingly prominent. Malicious actors
Externí odkaz:
https://doaj.org/article/5075f010c12140518fce909eac2838d7