+

Abidar et al., 2015 - Google Patents

Intelligent and pervasive supervising platform for information system security based on multi-agent systems

Abidar et al., 2015

View PDF
Document ID
8522421524783193511
Author
Abidar R
Moummadi K
Moutaouakkil F
Medromi H
Publication year
Publication venue
International review on computers and software

External Links

Snippet

As the development of technology, the mobile phone world also has developed very quickly. Mobile communication and services, over emerging wireless technologies, provide anyone, anytime and anywhere access. Moreover, the intelligence is now often embedded into …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status

Similar Documents

Publication Publication Date Title
Yu et al. A survey on IIoT security
Alhaidari et al. Cloud of Things: architecture, applications and challenges
Jamali et al. Towards the internet of things
Román-Castro et al. Evolution and trends in IoT security
Furfaro et al. Using virtual environments for the assessment of cybersecurity issues in IoT scenarios
Samaila et al. Challenges of securing Internet of Things devices: A survey
Al-Muhtadi et al. A lightweight cyber security framework with context-awareness for pervasive computing environments
Neisse et al. A model-based security toolkit for the internet of things
Abidar et al. Intelligent and pervasive supervising platform for information system security based on multi-agent systems
Pal et al. IoT technical challenges and solutions
Zheng et al. Towards IoT security automation and orchestration
Roman et al. Evolution and Trends in the Security of the Internet of Things
Meziane et al. A Study of Modelling IoT Security Systems with Unified Modelling Language (UML)
Gopal et al. Security, Privacy and Challenges in Microservices Architecture and Cloud Computing-Survey
Al-Aqrabi et al. Dynamic authentication for intelligent sensor clouds in the Internet of Things
George et al. Claimsware: A claims-based middleware for securing iot services
Sloman et al. Engineering policy-based ubiquitous systems
El Bouanani et al. Towards understanding internet of things security and its empirical vulnerabilities: a survey
Toapanta et al. Definition of a security prototype for IoT applied to higher education
Baldini et al. A framework for privacy protection and usage control of personal data in a smart city scenario
Balamurugan et al. A review on privacy and security challenges in the Internet of things (IoT) to protect the device and communications networks
Arabo Privacy-aware IoT cloud survivability for future connected home ecosystem
Ahmed et al. Secured framework for IoT using blockchain
Manifavas et al. Policy-based access control for body sensor networks
Boussard et al. A process for generating concrete architectures
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载