All Stories

  1. Trust-Aware Distributed and Hybrid Intrusion Detection for Rank Attacks in RPL IoT Environments
  2. PQBFL: A Post-Quantum Blockchain-based protocol for Federated Learning
  3. Blockchain Hybrid-model Scheme for Scalable Cross-domain Authorisation
  4. Insights for metrics in assessing TSCH scheduling efficiency
  5. RT-Ranked
  6. Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions
  7. Quoting inherent issues from TSCH behaviour.
  8. L-ECQV: Lightweight ECQV Implicit Certificates for Authentication in the Internet of Things
  9. Energy-Aware Security Adaptation for Low-Power IoT Applications
  10. A survey on security approaches on PPDR systems towards 5G and beyond
  11. IoT-Sentry: A Cross-Layer-Based Intrusion Detection System in Standardized Internet of Things
  12. A Security Gateway for power distribution systems in open networks
  13. Security and Privacy for Mobile IoT Applications Using Blockchain
  14. Blockchain-based scalable authentication for IoT
  15. Towards a Secure Internet of Things: A Comprehensive Study of Second Line Defense Mechanisms
  16. Integrating LPWAN Technologies in the 5G Ecosystem: A Survey on Security Challenges and Solutions
  17. Internet of Things (IoT)
  18. Driving Profile using Evolutionary Computation
  19. A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things
  20. Intrusion Detection and Prevention in CoAP Wireless Sensor Networks Using Anomaly Detection
  21. An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN
  22. Intrusion Detection and Prevention with Internet-integrated CoAP Sensing Applications
  23. Adaptable End-To-End Security For Mobile IoT Sensing Applications
  24. On-chip system call tracing: A feasibility study and open prototype
  25. End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices
  26. A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
  27. Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey
  28. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
  29. Communication and Security in Machine-to-Machine Systems
  30. Message from CFIC coimbra 2013 chairs
  31. Application-Layer Security for the WoT: Extending CoAP to Support End-to-End Message Security for Internet-Integrated Sensing Applications
  32. On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications
  33. Network-layer security for the Internet of Things using TinyOS and BLIP
  34. On the feasibility of secure application-layer communications on the Web of Things
  35. A Taxonomy of Wireless Sensor Networks with QoS
  36. Enabling Network-Layer Security on IPv6 Wireless Sensor Networks
  37. A secure interconnection model for IPv6 enabled wireless sensor networks
  38. Why is IPSec a viable option for wireless sensor networks