All Stories

  1. Trust-Aware Distributed and Hybrid Intrusion Detection for Rank Attacks in RPL IoT Environments
  2. Trust-Aware Distributed and Hybrid Intrusion Detection for Rank Attacks in RPL IoT Environments
  3. PQBFL: A Post-Quantum Blockchain-based protocol for Federated Learning
  4. Blockchain Hybrid-model Scheme for Scalable Cross-domain Authorisation
  5. Insights for metrics in assessing TSCH scheduling efficiency
  6. RT-Ranked
  7. Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions
  8. Quoting inherent issues from TSCH behaviour.
  9. L-ECQV: Lightweight ECQV Implicit Certificates for Authentication in the Internet of Things
  10. Energy-Aware Security Adaptation for Low-Power IoT Applications
  11. A survey on security approaches on PPDR systems towards 5G and beyond
  12. IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things
  13. A Security Gateway for power distribution systems in open networks
  14. Security and Privacy for Mobile IoT Applications Using Blockchain
  15. Blockchain-based scalable authentication for IoT
  16. Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms
  17. Integrating LPWAN Technologies in the 5G Ecosystem: A Survey on Security Challenges and Solutions
  18. Internet of Things (IoT)
  19. Driving Profile using Evolutionary Computation
  20. A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things
  21. Intrusion Detection and Prevention in CoAP Wireless Sensor Networks Using Anomaly Detection
  22. An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN
  23. Intrusion Detection and Prevention with Internet-integrated CoAP Sensing Applications
  24. Adaptable End-To-End Security For Mobile IoT Sensing Applications
  25. On-chip system call tracing: A feasibility study and open prototype
  26. End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices
  27. A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
  28. Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey
  29. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
  30. Communication and Security in Machine-to-Machine Systems
  31. Message from CFIC coimbra 2013 chairs
  32. Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications
  33. On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications
  34. Network-layer security for the Internet of Things using TinyOS and BLIP
  35. On the feasibility of secure application-layer communications on the Web of Things
  36. A Taxonomy of Wireless Sensor Networks with QoS
  37. Enabling Network-Layer Security on IPv6 Wireless Sensor Networks
  38. A secure interconnection model for IPv6 enabled wireless sensor networks
  39. Why is IPSec a viable option for wireless sensor networks