Nome |
# |
Internet of things: Vision, applications and research challenges, file e2188be6-01b8-4564-e053-6605fe0a49d6
|
29.754
|
Dealing with Anonymity in Wireless Sensor Networks, file e2188be5-fd97-4564-e053-6605fe0a49d6
|
599
|
A security-and quality-aware system architecture for Internet of Things, file e2188be6-0fb7-4564-e053-6605fe0a49d6
|
427
|
DyDAP: A Dynamic Data Aggregation Scheme for Privacy Aware Wireless Sensor Networks, file e2188be5-fe1b-4564-e053-6605fe0a49d6
|
380
|
DARE: evaluating Data Accuracy using node REputation, file e2188be6-02dc-4564-e053-6605fe0a49d6
|
295
|
Improving data quality using a cross layer protocol in wireless sensor networks, file e2188be6-00e9-4564-e053-6605fe0a49d6
|
214
|
Localization security in wireless sensor networks as a non-cooperative game, file e2188be5-fd63-4564-e053-6605fe0a49d6
|
186
|
Mobility and quality of service across heterogeneous wireless networks, file e2188be5-fd95-4564-e053-6605fe0a49d6
|
173
|
Assessed Quality of service and Voice and Data Integration: a case study, file e2188be5-fb60-4564-e053-6605fe0a49d6
|
171
|
Performance Evaluation of an Hybrid Mesh and Sensor Network, file e2188be5-ff6d-4564-e053-6605fe0a49d6
|
150
|
Privacy aware systems:from models to patterns, file e2188be5-fd96-4564-e053-6605fe0a49d6
|
107
|
From design to prototyping in the Internet of Things: A domotics case study, file e2188be7-fb7d-4564-e053-6605fe0a49d6
|
40
|
Attribute-Based Encryption and Sticky Policies for Data Access Control in a Smart Home Scenario: a Comparison on Networked Smart Object Middleware, file e2188be7-fa92-4564-e053-6605fe0a49d6
|
38
|
JOURNAL ON SPECIAL TOPICS IN MOBILE NETWORKS AND APPLICATIONS, file e2188be5-ff46-4564-e053-6605fe0a49d6
|
18
|
5G in the Internet of Things era: an overview on security and privacy challenges, file e2188be7-65fe-4564-e053-6605fe0a49d6
|
17
|
Securing the access control policies to the Internet of Things resources through permissioned blockchain, file e2188be8-269c-4564-e053-6605fe0a49d6
|
15
|
Analysis on functionalities and security features of Internet of Things related protocols, file e2188be8-3750-4564-e053-6605fe0a49d6
|
15
|
Beyond the smart things: Towards the definition and the performance assessment of a secure architecture for the Internet of Nano-Things, file e2188be7-392a-4564-e053-6605fe0a49d6
|
10
|
Performance comparison of reputation assessment techniques based on self organizing maps in wireless sensor networks, file e2188be6-e584-4564-e053-6605fe0a49d6
|
8
|
AUPS: an Open Source AUthenticated Publish/Subscribe system for the Internet of Things, file e2188be6-5e12-4564-e053-6605fe0a49d6
|
7
|
Dynamic Policies in Internet of Things: Enforcement and Synchronization, file e2188be7-3189-4564-e053-6605fe0a49d6
|
7
|
Sticky Policies: A Survey, file e2188be7-81e7-4564-e053-6605fe0a49d6
|
7
|
Security&privacy issues and challenges in NoSQL databases, file e2188be8-20b1-4564-e053-6605fe0a49d6
|
7
|
A secure and quality-aware prototypical architecture for the Internet of Things, file e2188be6-58f5-4564-e053-6605fe0a49d6
|
6
|
Security, privacy and trust in Internet of Things: The road ahead, file e2188be6-8978-4564-e053-6605fe0a49d6
|
6
|
A Comparative Study of Recent Wireless Sensor Network Simulators, file e2188be6-88be-4564-e053-6605fe0a49d6
|
5
|
Security Policy Enforcement for Networked Smart Objects, file e2188be6-88c1-4564-e053-6605fe0a49d6
|
5
|
S²DCC: Secure Selective Dropping Congestion Control in hybrid wireless multimedia sensor networks, file e2188be6-bd72-4564-e053-6605fe0a49d6
|
5
|
Security towards the Edge: Sticky Policy Enforcement for Networked Smart Objects, file e2188be6-d747-4564-e053-6605fe0a49d6
|
5
|
Home quarantine patient monitoring in the era of COVID-19 disease, file e2188be7-f8b4-4564-e053-6605fe0a49d6
|
5
|
Insights into security and privacy towards fog computing evolution, file 1072836e-6c7d-44f4-a943-0c9fd982e954
|
4
|
Smart certification: protecting the originality of the product in the eyewear sector, file e2188be7-5606-4564-e053-6605fe0a49d6
|
4
|
A NFP Model for Internet of Things applications, file e2188be6-224a-4564-e053-6605fe0a49d6
|
3
|
Deep reinforcement learning for intrusion detection in internet of things: best practices, lessons learnt, and open challenges, file d4d305dc-50d3-47a3-8e85-bd77e344d872
|
2
|
Assessing the risk to intercept VoIP calls, file e2188be5-f7db-4564-e053-6605fe0a49d6
|
2
|
Secure OM2M Service Platform, file e2188be6-24c3-4564-e053-6605fe0a49d6
|
2
|
Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and security, file e2188be7-64a7-4564-e053-6605fe0a49d6
|
2
|
How to evaluate an Internet of Things system: models, case studies, and real developments, file e2188be7-cc42-4564-e053-6605fe0a49d6
|
2
|
REATO: REActing TO denial of service attacks in the Internet of Things, file e2188be7-fbfb-4564-e053-6605fe0a49d6
|
2
|
Security Games for Node Localization through Verifiable Multilateration, file 6b71f8d1-c212-41d0-b1ab-15cd7ca59949
|
1
|
Risk Assessment in Practice: A Real Case Study, file e2188be5-f7dc-4564-e053-6605fe0a49d6
|
1
|
SETA: A SEcure sharing of TAsks in clustered wireless sensor networks, file e2188be6-2244-4564-e053-6605fe0a49d6
|
1
|
Cross layer Data Assessment in Wireless Sensor Networks, file e2188be6-224c-4564-e053-6605fe0a49d6
|
1
|
Towards the definition of a framework for service development in the agrofood domain: a conceptual model, file e2188be6-24cf-4564-e053-6605fe0a49d6
|
1
|
GoNe: dealing with node behavior, file e2188be6-2628-4564-e053-6605fe0a49d6
|
1
|
Routing Behavior across WSN Simulators: the AODV Case Study, file e2188be6-4e61-4564-e053-6605fe0a49d6
|
1
|
Networked Smart Objects: Moving Data Processing Closer to the Source, file e2188be6-de93-4564-e053-6605fe0a49d6
|
1
|
Securing the Smart Home: a real case study, file e2188be6-f24e-4564-e053-6605fe0a49d6
|
1
|
Solving Interoperability within the Smart Building: a Real Test-Bed, file e2188be7-04b6-4564-e053-6605fe0a49d6
|
1
|
Toward Data Governance in the Internet of Things, file e2188be7-1f2c-4564-e053-6605fe0a49d6
|
1
|
Smart Transport and Logistic: a Node-RED implementation, file e2188be7-2b05-4564-e053-6605fe0a49d6
|
1
|
Totale |
32.717 |