Similar Items: IoT Challenges
- Federated semantic nodes to scale search process in the IoT
- A prototype for updating the “things” in IoT: framework for cybersecurity implementation
- Protocol guided mutation fuzzing to automatically discover vulnerability in commercial IoT devices
- Decision tree based energy aware and delay optimized task offloading in IoT networks
- A systematic literature review on IoT application layer protocol testing and future research directions
- An energy efficient authentication method for IoT-enabled edge computing using hybrid metaheuristic optimization