Search

Your search keyword '"Thomas Newe"' showing total 177 results

Search Constraints

Start Over You searched for: Author "Thomas Newe" Remove constraint Author: "Thomas Newe"
177 results on '"Thomas Newe"'

Search Results

1. Securing industry 5.0 using 6σ CYBERNETIC framework

2. E-DPNCT: an enhanced attack resilient differential privacy model for smart grids using split noise cancellation

3. Decision-Based Routing for Unmanned Aerial Vehicles and Internet of Things Networks

4. Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review

5. A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning

6. Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them

7. The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment

8. Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap

9. Integration of an MES and AIV Using a LabVIEW Middleware Scheduler Suitable for Use in Industry 4.0 Applications

10. Bloom filter–based efficient broadcast algorithm for the Internet of things

11. Real-Time Secure/Unsecure Video Latency Measurement/Analysis with FPGA-Based Bump-in-the-Wire Security

13. Underwater Depth and Temperature Sensing Based on Fiber Optic Technology for Marine and Fresh Water Applications

14. Inspection-Class Remotely Operated Vehicles—A Review

15. An Experimental Study of the Effects of External Physiological Parameters on the Photoplethysmography Signals in the Context of Local Blood Pressure (Hydrostatic Pressure Changes)

16. An Optical Fibre Depth (Pressure) Sensor for Remote Operated Vehicles in Underwater Applications

17. A Lightweight Classification Algorithm for External Sources of Interference in IEEE 802.15.4-Based Wireless Sensor Networks Operating at the 2.4 GHz

18. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks

19. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT

46. Radio fingerprinting for anomaly detection using federated learning in LoRa-enabled industrial internet of things

Catalog

Books, media, physical & digital resources