NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 57
1.
  • Big data and IoT-based appl... Big data and IoT-based applications in smart environments: A systematic review
    Hajjaji, Yosra; Boulila, Wadii; Farah, Imed Riadh ... Computer science review, February 2021, 2021-02-00, Letnik: 39
    Journal Article
    Odprti dostop

    This paper reviews big data and Internet of Things (IoT)-based applications in smart environments. The aim is to identify key areas of application, current trends, data architectures, and ongoing ...
Celotno besedilo

PDF
2.
  • Lightweight edge authentica... Lightweight edge authentication for software defined networks
    Almaini, Amar; Al-Dubai, Ahmed; Romdhani, Imed ... Computing, 02/2021, Letnik: 103, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network ...
Celotno besedilo

PDF
3.
  • Ontology-Based Linked Data ... Ontology-Based Linked Data to Support Decision-Making within Universities
    Ashour, Ghadeer; Al-Dubai, Ahmed; Romdhani, Imed ... Mathematics (Basel), 09/2022, Letnik: 10, Številka: 17
    Journal Article
    Recenzirano
    Odprti dostop

    In recent years, educational institutions have worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most of the ...
Celotno besedilo
4.
  • Towards the Development of ... Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing
    Kerrouche, Abdelfateh; Lithgow, Jordan; Muhammad, Ilyas ... Applied sciences, 04/2020, Letnik: 10, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Waterborne pathogens affect all waters globally and proceed to be an ongoing concern. Previous methods for detection of pathogens consist of a high test time and a high sample consumption, but they ...
Celotno besedilo

PDF
5.
  • Wireless Body Area Network ... Wireless Body Area Network (WBAN)
    Salayma, Marwa; Al-Dubai, Ahmed; Romdhani, Imed ... ACM computing surveys, 01/2018, Letnik: 50, Številka: 1
    Journal Article
    Recenzirano

    Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, ...
Celotno besedilo
6.
  • Reliability and energy effi... Reliability and energy efficiency enhancement in wireless body area networks for e-health
    Salayma, Marwa; Al-Dubai, Ahmed; Romdhani, Imed 2016 19th Conference of Open Innovations Association (FRUCT), 01/2016, Letnik: 420, Številka: 19
    Conference Proceeding, Journal Article
    Recenzirano
    Odprti dostop

    Wireless Body Area Network (WBAN) has been a potential avenue for future digitized healthcare systems. WBAN has unique challenges and features compared to other wireless sensor networks. In addition ...
Celotno besedilo

PDF
7.
  • Trust-aware and cooperative... Trust-aware and cooperative routing protocol for IoT security
    Djedjig, Nabil; Tandjaoui, Djamel; Medjek, Faiza ... Journal of information security and applications, June 2020, 2020-06-00, Letnik: 52
    Journal Article
    Recenzirano
    Odprti dostop

    The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption ...
Celotno besedilo
8.
  • Addressing the DAO Insider ... Addressing the DAO Insider Attack in RPL's Internet of Things Networks
    Ghaleb, Baraq; Al-Dubai, Ahmed; Ekonomou, Elias ... IEEE communications letters, 2019-Jan., 2019-1-00, 20190101, Letnik: 23, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    In RPL routing protocol, the destination advertisement object (DAO) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit ...
Celotno besedilo

PDF
9.
  • Multicast DIS attack mitiga... Multicast DIS attack mitigation in RPL-based IoT-LLNs
    Medjek, Faiza; Tandjaoui, Djamel; Djedjig, Nabil ... Journal of information security and applications, September 2021, 2021-09-00, Letnik: 61
    Journal Article
    Recenzirano
    Odprti dostop

    The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy ...
Celotno besedilo
10.
  • Fault-tolerant AI-driven In... Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things
    Medjek, Faiza; Tandjaoui, Djamel; Djedjig, Nabil ... International journal of critical infrastructure protection, September 2021, 2021-09-00, Letnik: 34
    Journal Article
    Recenzirano

    Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been introduced, especially ...
Celotno besedilo
1 2 3 4 5
zadetkov: 57

Nalaganje filtrov