Sun et al., 2021 - Google Patents
Network security technology of intelligent information terminal based on mobile internet of thingsSun et al., 2021
View PDF- Document ID
- 10608536488241749805
- Author
- Sun N
- Li T
- Song G
- Xia H
- Publication year
- Publication venue
- Mobile Information Systems
External Links
Snippet
In the process of implementing the Internet of Things, the object itself has identity information and identification equipment and encounters difficulties in communication security during the process of entering the network communication. Just like the Internet and wireless …
- 238000005516 engineering process 0 title abstract description 31
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ghimire et al. | Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things | |
| Meng et al. | Enhancing medical smartphone networks via blockchain-based trust management against insider attacks | |
| Sun et al. | Network security technology of intelligent information terminal based on mobile internet of things | |
| Man et al. | Intelligent Intrusion Detection Based on Federated Learning for Edge‐Assisted Internet of Things | |
| Kumar et al. | A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing | |
| Ma | Smart city and cyber-security; technologies used, leading challenges and future recommendations | |
| Meng et al. | Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data | |
| Deng et al. | Retracted article: mobile network intrusion detection for IoT system based on transfer learning algorithm | |
| Xing et al. | Survey on botnet detection techniques: Classification, methods, and evaluation | |
| Yahuza et al. | Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities | |
| Meng et al. | Detecting insider attacks in medical cyber–physical networks based on behavioral profiling | |
| Yi et al. | Web phishing detection using a deep learning framework | |
| Pasikhani et al. | Intrusion detection systems in RPL-based 6LoWPAN: A systematic literature review | |
| Meng et al. | A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks | |
| Chowdhury et al. | A novel insider attack and machine learning based detection for the internet of things | |
| Li et al. | Complex attack linkage decision-making in edge computing networks | |
| Zahra et al. | A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic-and fog-based approach | |
| Zheng et al. | Dynamic network security mechanism based on trust management in wireless sensor networks | |
| Song et al. | Autoregressive integrated moving average model–based secure data aggregation for wireless sensor networks | |
| Li et al. | Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks | |
| Li et al. | Effective data optimization and evaluation based on social communication with AI‐assisted in opportunistic social networks | |
| Manzoor et al. | Federated learning based privacy ensured sensor communication in IoT networks: a taxonomy, threats and attacks | |
| Cheng et al. | Predicting the APT for Cyber Situation Comprehension in 5G‐Enabled IoT Scenarios Based on Differentially Private Federated Learning | |
| Dong et al. | BotDetector: An extreme learning machine‐based Internet of Things botnet detection model | |
| Li et al. | A fog‐based collaborative intrusion detection framework for smart grid |