Search

Your search keyword '"Asim, Muhammad"' showing total 27 results

Search Constraints

Start Over You searched for: Author "Asim, Muhammad" Remove constraint Author: "Asim, Muhammad" Topic internet of things Remove constraint Topic: internet of things
27 results on '"Asim, Muhammad"'

Search Results

1. Efficient Approach for Anomaly Detection in IoT Using System Calls.

2. THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.

3. Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.

4. OWL-T for a Semantic Description of IoT

6. Investigating applications of internet of things in medical libraries of Pakistan: An empirical study.

8. Thing Federation as a Service: Foundations and Demonstration

9. Optimizing Requirements Prioritization for IoT Applications Using Extended Analytical Hierarchical Process and an Advanced Grouping Framework.

10. Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves.

12. An Improved Big Data Analytics Architecture Using Federated Learning for IoT-Enabled Urban Intelligent Transportation Systems.

13. A novel simulated annealing trajectory optimization algorithm in an autonomous UAVs-empowered MFC system for medical internet of things devices.

14. IoT based battery energy monitoring and management for electric vehicles with improved converter efficiency.

15. New Focus For Industrialization 4.0: Economic Growth Through Industrial Energy Management.

16. Feature engineering and deep learning-based intrusion detection framework for securing edge IoT.

17. Applications of Internet of Things in university libraries of Pakistan: An empirical investigation.

18. Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis.

19. CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things applications.

20. Blockchain and Smart Healthcare Security: A Survey.

21. A secure fog‐based platform for SCADA‐based IoT critical infrastructure.

22. A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT.

23. A smartphone sensors-based personalized human activity recognition system for sustainable smart cities.

24. A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things.

25. Machine learning and the Internet of Things security: Solutions and open challenges.

26. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.

27. A Mechanism for Securing IoT-enabled Applications at the Fog Layer.

Catalog

Books, media, physical & digital resources