Results 1 - 10
of
127
Internet of Things for Smart Crime Detection
, 2014
"... Abstract The rapid economic development in South Korea has resulted in increase of crimes. Timely detection and reduction of crimes are primary focus of police officers. Internet of Things (IoT) and increasingly cheap and wearable sensors can be used to facilitate this task. Generally, the applicat ..."
Abstract
- Add to MetaCart
Abstract The rapid economic development in South Korea has resulted in increase of crimes. Timely detection and reduction of crimes are primary focus of police officers. Internet of Things (IoT) and increasingly cheap and wearable sensors can be used to facilitate this task. Generally
Digital Object Memories in the Internet of Things Workshop (DOME-IoT 2010)
"... Everyday objects tagged with sensors and actuators that communicate and cooperate provide the foundation of the Internet of Things. Most applications in the Internet of Things deal with information related to such objects in the one or other way, whilst Digital Object Memories comprise hardware and ..."
Abstract
- Add to MetaCart
Everyday objects tagged with sensors and actuators that communicate and cooperate provide the foundation of the Internet of Things. Most applications in the Internet of Things deal with information related to such objects in the one or other way, whilst Digital Object Memories comprise hardware
Digital Object Memories for the Internet of Things (DOMe-IoT)
, 2012
"... Digital Object Memories (DOMe) comprise hardware and software components, which together provide an open and universal platform for capturing and interacting with the digital information of connected objects- including storage, documentation and provision of information concerning actions an object ..."
Abstract
- Add to MetaCart
. The goal of this established workshop series is to twofold: 1.) initiate a conversation concerning the potential for objects to develop agency; and 2.) explore how data that is associated with an object may leverage real-world actions. DOMe-IoT 2012 provides a hybrid interdisciplinary workshop format
SOLID STATE MASS MEMORIES IN THE WORLD OF INTERNET OF THINGS
, 2015
"... The thesis is written as a consulting assignment to Helsinki Memory Technolo-gies Oy. The motivation for this assignment was to learn more about mass memories as a part of Internet of Things ecosystem. Additionally, the thesis seeks if there could be the potentially new business opportunities at the ..."
Abstract
- Add to MetaCart
at the target field. The thesis describes core technologies related to the solid state mass memories in the world of Internet of Things (IoT) at Chapter 2 to 4. Standards chapter covers the benefits of the standardization and the most important corresponding IoT forums. That chapter also summarizes IoT
Non-Gaussian and long memory statistical characterisations for internet traffic with anomalies
- IEEE TRANS. ON DEPEND. AND SECURE COMP
, 2005
"... The goals of the present contribution are twofold. First, we propose the use of a non-Gaussian long-range dependent process to model Internet traffic aggregated time series. We give the definitions and intuition behind the use of this model. We detail numerical procedures that can be used to synth ..."
Abstract
-
Cited by 37 (10 self)
- Add to MetaCart
-resolution (i.e., aggregation level dependent) statistics to characterize the traffic: the evolution of the estimated parameters with respect to the aggregation level. It opens the track to the second goal of the paper: anomaly detection. We propose the use of a quadratic distance computed on this statistics
Sybil Attacks and Their Defenses in the Internet of Things
, 2014
"... The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate spam. In this paper, we survey Sybil attacks and defense schemes in IoT. Specifically, we fi ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate spam. In this paper, we survey Sybil attacks and defense schemes in IoT. Specifically, we
Improved Layered Architecture for Internet of Things
"... The internet of things (IoT) is a concept that has a role in facilitating people lives through the use of tablets, smartphones, PCs and other devices connected to the internet. Knowing that the number of people using connected devices on the internet increases every year dramatically. Also, internet ..."
Abstract
- Add to MetaCart
about the physical world, leading to innovative services and increasing efficiency and productivity. This paper proposes an improved architecture to the internet of things (IoT) that takes into consideration the environment surrounding the devices, including the objects to be detected or the places
Cognitive Management Framework for Internet of Things
"... applications are modeled to understand and react based on existing contextual and situational parameters. This work implements a management flow for the abstraction of real world objects and virtual composition of those objects to provide IoT services. We also present a real world knowledge model th ..."
Abstract
- Add to MetaCart
applications are modeled to understand and react based on existing contextual and situational parameters. This work implements a management flow for the abstraction of real world objects and virtual composition of those objects to provide IoT services. We also present a real world knowledge model
Real Time Intrusion and Wormhole Attack Detection in Internet of Things
"... There are currently more objects connected to the Internet than people in the world. This gap will continue to grow, as more ob-jects gain the ability to directly interface with the Internet. Pro-viding security in IoT is challenging as the devices are resource constrained, the communication links a ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
There are currently more objects connected to the Internet than people in the world. This gap will continue to grow, as more ob-jects gain the ability to directly interface with the Internet. Pro-viding security in IoT is challenging as the devices are resource constrained, the communication links
A Trustful Infrastructure for the Internet of Things based on EPOSMote
"... Abstract—This article describes the design, implementation and evaluation of a trustful infrastructure for the Internet of Things (IoT) based on EPOSMote. The infrastructure was built around EPOS ’ second generation of motes, which features an ARM processor and an IEEE 802.15.4 radio transceiver. It ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
Abstract—This article describes the design, implementation and evaluation of a trustful infrastructure for the Internet of Things (IoT) based on EPOSMote. The infrastructure was built around EPOS ’ second generation of motes, which features an ARM processor and an IEEE 802.15.4 radio transceiver
Results 1 - 10
of
127