Show newer

How much Time and Power are consumed by on a secure device...

"Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device"
dl.acm.org/doi/pdf/10.1145/336

Sharing Geolocation Securely over networks via Proof-of-Location ...

"Quantifying location privacy in permissioned blockchain-based internet of things (IoT)"
dl.acm.org/doi/pdf/10.1145/336

Managing faulty sensors and data tampering in Smart Cities...

"Assessing Reliability of Big Data Stream for Smart City"
dl.acm.org/doi/abs/10.1145/337

Transmitting Geolocation securely over peer-to-peer sensor networks... For tracking endangered animals...

"A Routing Protocol for Source Location Privacy in Wireless Sensor Networks with Multiple Sources"
dl.acm.org/doi/pdf/10.1145/334

Logging Rainfall with network and boards...

"Rainfall Intensity Datalogger System. LoPy4-Based Design and Implementation"
dl.acm.org/doi/pdf/10.1145/334

Detecting empty Parking Lots with Computer Vision for Smart Cities ...

"Smart IoT Notification System for Efficient In-City Parking"
dl.acm.org/doi/pdf/10.1145/334

Range of networks in river forests...

"Evaluation of LoRaWAN Transmission Range for Wireless Sensor Networks in Riparian Forests"
dl.acm.org/doi/pdf/10.1145/334

Energy Harvesting devices need device drivers that are fully aware of power consumption...

"Energy-aware device drivers for embedded operating systems"
dl.acm.org/doi/pdf/10.1145/337

Clustering for ... To reduce the CPU and comms on IoT devices...

"Mitigating Messaging and Processing Load in IoT Environments Managed by Blockchain"
dl.acm.org/doi/pdf/10.1145/336

What's next for Gateways...

"Gateways to Heaven: Observations and Predictions on the Software Architecture of IoT Gateways"
dl.acm.org/doi/pdf/10.1145/336

Attacking Industrial networks via ...

"If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic"
dl.acm.org/doi/pdf/10.1145/337

Underwater low-power sensor networks with positioning... Based on cheap Acoustic Modems...

"ahoi: Inexpensive, Low-power Communication and Localization for Underwater Sensor Networks and μAUVs"
dl.acm.org/doi/pdf/10.1145/337

Trusted Home with , and ...

"Design and Development of Smart Home Sensing Supported by Blockchain Technology"
dl.acm.org/doi/pdf/10.1145/337

Adapting programs to run on devices with intermittent power sources (like energy harvesting)...

"Time-sensitive Intermittent Computing Meets Legacy Software"
dl.acm.org/doi/pdf/10.1145/337

Creating apps through modelling...

"AutoIoT: a framework based on user-driven MDE for generating IoT applications"
dl.acm.org/doi/pdf/10.1145/334

Using multiple sensors with Industrial Social to detect events...

"Trustworthy intelligent industrial monitoring architecture for early event detection by exploiting social IoT"
dl.acm.org/doi/pdf/10.1145/334

on constrained sensor devices based on ...

"Embedded Machine Learning-Based Data Reduction in Application-Specific Constrained IoT Networks"
dl.acm.org/doi/pdf/10.1145/334

Marketplace for sensor data...

"Sensmart: Sensor Data Market for the Internet of Things"
dl.acm.org/doi/pdf/10.1145/334

Protecting devices from security attacks via ...

"SIP Shaker: Sofware Integrity Protection Composition"
dl.acm.org/doi/pdf/10.1145/335

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.