Author:
Upahm Abas Sherhan,Duran Fecir,Tekerek Adem
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference36 articles.
1. Adeyemi, B., Ogbeyemi, A., & Zhang, W. (2021).Combining simple motion measurement, lean analysis technique and historical data review for countering negative labor cost variance: A case study.International Journal of Engineering Business Management,13, 18479790211023617.
2. Ataşen, K., & Üstünel, H. (2019, October). Designing a Secure IoT Network by Using Blockchain. In2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)(pp. 1-4). IEEE.
3. That ‘internet of things’ thing;Ashton;RFID journal,2009
4. Assessing risks and threats with layered approach to Internet of Things security;Aydos;Measurement and Control,2019
5. Bernstein, C. (2023). Personally Identified Information (PII). Retrieved from https://www.techtarget.com/searchsecurity/definition/personally-identifiable-information-PII (accessed on 10 Mar 2023).
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review;SECURITY AND PRIVACY;2024-07-12
2. Device For Securing IoT In The Wireless Environment;2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI);2024-06-27
3. Exploration of the Role of Cryptoprocessors in Advancing IoT Security;2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT);2024-04-29
4. An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation;Future Generation Computer Systems;2024-03
5. The Synergy of Blockchain and IoT: A Comprehensive Security Perspective;2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT);2024-02-09