Abidar et al., 2015 - Google Patents
Intelligent and pervasive supervising platform for information system security based on multi-agent systemsAbidar et al., 2015
View PDF- Document ID
- 8522421524783193511
- Author
- Abidar R
- Moummadi K
- Moutaouakkil F
- Medromi H
- Publication year
- Publication venue
- International review on computers and software
External Links
Snippet
As the development of technology, the mobile phone world also has developed very quickly. Mobile communication and services, over emerging wireless technologies, provide anyone, anytime and anywhere access. Moreover, the intelligence is now often embedded into …
- 239000003795 chemical substances by application 0 abstract description 125
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yu et al. | A survey on IIoT security | |
| Alhaidari et al. | Cloud of Things: architecture, applications and challenges | |
| Jamali et al. | Towards the internet of things | |
| Román-Castro et al. | Evolution and trends in IoT security | |
| Furfaro et al. | Using virtual environments for the assessment of cybersecurity issues in IoT scenarios | |
| Samaila et al. | Challenges of securing Internet of Things devices: A survey | |
| Al-Muhtadi et al. | A lightweight cyber security framework with context-awareness for pervasive computing environments | |
| Neisse et al. | A model-based security toolkit for the internet of things | |
| Abidar et al. | Intelligent and pervasive supervising platform for information system security based on multi-agent systems | |
| Pal et al. | IoT technical challenges and solutions | |
| Zheng et al. | Towards IoT security automation and orchestration | |
| Roman et al. | Evolution and Trends in the Security of the Internet of Things | |
| Meziane et al. | A Study of Modelling IoT Security Systems with Unified Modelling Language (UML) | |
| Gopal et al. | Security, Privacy and Challenges in Microservices Architecture and Cloud Computing-Survey | |
| Al-Aqrabi et al. | Dynamic authentication for intelligent sensor clouds in the Internet of Things | |
| George et al. | Claimsware: A claims-based middleware for securing iot services | |
| Sloman et al. | Engineering policy-based ubiquitous systems | |
| El Bouanani et al. | Towards understanding internet of things security and its empirical vulnerabilities: a survey | |
| Toapanta et al. | Definition of a security prototype for IoT applied to higher education | |
| Baldini et al. | A framework for privacy protection and usage control of personal data in a smart city scenario | |
| Balamurugan et al. | A review on privacy and security challenges in the Internet of things (IoT) to protect the device and communications networks | |
| Arabo | Privacy-aware IoT cloud survivability for future connected home ecosystem | |
| Ahmed et al. | Secured framework for IoT using blockchain | |
| Manifavas et al. | Policy-based access control for body sensor networks | |
| Boussard et al. | A process for generating concrete architectures |