Journal articles on the topic 'Military IoT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Military IoT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sonare, Renuka Chandrakant, and Dinesh V. Rojatkar. "Application OF IoT in Military Service." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 794–97. http://dx.doi.org/10.31142/ijtsrd4629.
Full textToth, Andreas. "Internet of Things Vulnerabilities in Military Environments." Vojenské rozhledy 30, no. 3 (September 8, 2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.
Full textKattimani, Miss Jyoti G. "Military Health System using IOT." International Journal for Research in Applied Science and Engineering Technology 7, no. 4 (April 30, 2019): 2889–94. http://dx.doi.org/10.22214/ijraset.2019.4486.
Full textL., Kirubakaran, Sangeetha G., Rathna Priya, and Sudharsan S. "Military Surveillance System using IOT." International Journal of Computer Applications 176, no. 15 (April 15, 2020): 27–31. http://dx.doi.org/10.5120/ijca2020920067.
Full textLu, Ye, Chao Xie, and Li Shang. "Study on the Transformation of Military Logistical of Internet of Things Era." Applied Mechanics and Materials 596 (July 2014): 119–22. http://dx.doi.org/10.4028/www.scientific.net/amm.596.119.
Full textCha, Sungyong, Seungsoo Baek, Sooyoung Kang, and Seungjoo Kim. "Security Evaluation Framework for Military IoT Devices." Security and Communication Networks 2018 (July 3, 2018): 1–12. http://dx.doi.org/10.1155/2018/6135845.
Full textKumar K S, Yashwanth, and Dr Narasimha Murthy M S. "Design of Monitor Individuals Health using IOT A IOT Application for Military Area." International Journal of Innovative Science and Research Technology 5, no. 6 (July 3, 2020): 693–98. http://dx.doi.org/10.38124/ijisrt20jun291.
Full textPopescu, Florin. "From the IoT to the IoBT. The Path to Superior Situational Understanding." Land Forces Academy Review 24, no. 4 (December 1, 2019): 276–82. http://dx.doi.org/10.2478/raft-2019-0034.
Full textJung, Seung-hoon, Jae-choon An, Jin-young Park, Yong-tae Shin, and Jong-bae Kim. "An Empirical Study of the Military IoT Security Priorities." International Journal of Security and Its Applications 10, no. 8 (August 31, 2016): 13–22. http://dx.doi.org/10.14257/ijsia.2016.10.8.02.
Full textIyer, Brijesh, and Niket Patil. "IoT enabled tracking and monitoring sensor for military applications." International Journal of System Assurance Engineering and Management 9, no. 6 (July 19, 2018): 1294–301. http://dx.doi.org/10.1007/s13198-018-0727-8.
Full textJaya, Iksan, Edy Maryanto, Alexander Victor Bukit, and Muhamad Zulkifli. "DESIGN AND DEVELOPMENT OF EARLY HEAT STROKE DETECTION SYSTEM IN MILITARY CROSS COUNTRY BASED ON IoT." JOURNAL ASRO 9, no. 2 (December 22, 2018): 141. http://dx.doi.org/10.37875/asro.v9i2.241.
Full textPreda, Marius. "Digital Forensics of Internet of Things Smart Heating System Investigation." Journal of Military Technology 3, no. 1 (June 26, 2020): 23–28. http://dx.doi.org/10.32754/jmt.2020.1.04.
Full textKim, Bruce, and Sang-Bock Cho. "3D TSV-based Inductor Design for a Secure Internet of Things." International Symposium on Microelectronics 2016, no. 1 (October 1, 2016): 000364–67. http://dx.doi.org/10.4071/isom-2016-wp53.
Full textE. Abel, Edje, Abd Latiff Muhammad Shafie, and Weng Howe Chan. "Deployment of internet of things-based cloudlet-cloud for surveillance operations." IAES International Journal of Artificial Intelligence (IJ-AI) 10, no. 1 (March 1, 2021): 24. http://dx.doi.org/10.11591/ijai.v10.i1.pp24-34.
Full textAl-Duwairi, Basheer, Wafaa Al-Kahla, Mhd Ammar AlRefai, Yazid Abedalqader, Abdullah Rawash, and Rana Fahmawi. "SIEM-based detection and mitigation of IoT-botnet DDoS attacks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 2182. http://dx.doi.org/10.11591/ijece.v10i2.pp2182-2191.
Full textShree Gowri Santhosh .V, Vishal .E, Vishak .R, and Dr. K. Rahimunnisa. "LoRa-IoT Focused System of Defense for Equipped Troops [LIFE]." Journal of Ubiquitous Computing and Communication Technologies 2, no. 3 (September 18, 2020): 153–77. http://dx.doi.org/10.36548/jucct.2020.3.005.
Full textLakshmi Narayanan, K., G. P. Ramesh, and V. Divya. "Robust and brittle secured video for IOT." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 93. http://dx.doi.org/10.14419/ijet.v7i2.20.11762.
Full textCharan Patel, Bhagwati, Ram Shankar Tripathi, and Naveen Goel. "IoT an Overview: Advantage, Disadvantage and Applications." International Journal of Computer Applications Technology and Research 10, no. 05 (May 6, 2021): 119–22. http://dx.doi.org/10.7753/ijcatr1005.1003.
Full textShahid, Huniya, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Ikram Ud Din, Neeraj Kumar, and Carsten Maple. "Machine Learning-based Mist Computing Enabled Internet of Battlefield Things." ACM Transactions on Internet Technology 21, no. 4 (November 30, 2021): 1–26. http://dx.doi.org/10.1145/3418204.
Full textAhmed, Hassan I., Abdurrahman A. Nasr, Salah M. Abdel-Mageid, and Heba K. Aslan. "DADEM." International Journal of Ambient Computing and Intelligence 12, no. 1 (January 2021): 114–39. http://dx.doi.org/10.4018/ijaci.2021010105.
Full textGonzález-Landero, Franks, Iván García-Magariño, Raquel Lacuesta, and Jaime Lloret. "ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices." Wireless Communications and Mobile Computing 2018 (June 24, 2018): 1–11. http://dx.doi.org/10.1155/2018/7264269.
Full textGuan, Qing-yang, and Wu Shuang. "Signal Detection in Satellite-Ground IoT Link Based on Blind Neural Network." Wireless Communications and Mobile Computing 2021 (May 6, 2021): 1–10. http://dx.doi.org/10.1155/2021/5547989.
Full textLagkas, Thomas, Vasileios Argyriou, Stamatia Bibi, and Panagiotis Sarigiannidis. "UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things”." Sensors 18, no. 11 (November 17, 2018): 4015. http://dx.doi.org/10.3390/s18114015.
Full textInomoto, Hikaru, Sachio Saiki, Masahide Nakamura, and Shinsuke Matsumoto. "Design and evaluation of mission-oriented sensing platform with military analogy." International Journal of Pervasive Computing and Communications 13, no. 1 (April 3, 2017): 76–91. http://dx.doi.org/10.1108/ijpcc-01-2017-0007.
Full textKh., Teeba Ismail, and Ibrahim I. Hamarash. "Model-Based Quality Assessment of Internet of Things Software Applications: A Systematic Mapping Study." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 09 (June 17, 2020): 128. http://dx.doi.org/10.3991/ijim.v14i09.13431.
Full textKumar Dwivedi, Anshu, Awadhesh Kumar Sharma, and Pawan Singh Mehra. "Energy Efficient Sensor Node Deployment Scheme for Two Stage Routing Protocol of Wireless Sensor Networks assisted IoT." ECTI Transactions on Electrical Engineering, Electronics, and Communications 18, no. 2 (August 31, 2020): 158–69. http://dx.doi.org/10.37936/ecti-eec.2020182.240541.
Full textKarthik, M., and M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.
Full textAftab, Muhammad Umar, Ariyo Oluwasanmi, Abdullah Alharbi, Osama Sohaib, Xuyun Nie, Zhiguang Qin, and Son Tung Ngo. "Secure and dynamic access control for the Internet of Things (IoT) based traffic system." PeerJ Computer Science 7 (May 10, 2021): e471. http://dx.doi.org/10.7717/peerj-cs.471.
Full textSaleh, Mohammed. "WSNs and IoT Their Challenges and applications for Healthcare and Agriculture: A Survey." 3D SCEEER Conference sceeer, no. 3d (July 1, 2020): 37–43. http://dx.doi.org/10.37917/ijeee.sceeer.3rd.6.
Full textKang, James Jin, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, and Paul Haskell-Dowland. "No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design." IEEE Access 8 (2020): 201498–515. http://dx.doi.org/10.1109/access.2020.3035812.
Full textMadhiarasan, M. "Design and development of IoT based solar powered versatile moving robot for military application." International Journal of System Assurance Engineering and Management 12, no. 3 (April 16, 2021): 437–50. http://dx.doi.org/10.1007/s13198-021-01089-9.
Full textS, Swathi, and Yogish H K. "Secure data aggregation in IoT using Efficient-CSDA." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 4889. http://dx.doi.org/10.11591/ijece.v9i6.pp4889-4897.
Full textKumar, Dinesh, and Dr. S. Smys. "An Efficient Packet Delivery Scheme Using Trust Routing in G.9959 Protocol in a Wireless Sensor Network." Journal of Ubiquitous Computing and Communication Technologies 2, no. 3 (July 21, 2020): 118–25. http://dx.doi.org/10.36548/jucct.2020.3.001.
Full textG V, Abhishek. "Autonomous Intelligent POD for Military Purpose." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 839–48. http://dx.doi.org/10.22214/ijraset.2021.35068.
Full textKang, James Jin Won, and Henry Larkin. "Inference of Personal Sensors in the Internet of Things." International Journal of Information, Communication Technology and Applications 2, no. 1 (January 26, 2016): 1–23. http://dx.doi.org/10.17972/ijicta20162125.
Full textFeng, Yuan, Menglin Li, Chengyi Zeng, and Hongfu Liu. "Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective." Entropy 22, no. 10 (October 16, 2020): 1166. http://dx.doi.org/10.3390/e22101166.
Full textPradhan, Manas, and Josef Noll. "Security, Privacy, and Dependability Evaluation in Verification and Validation Life Cycles for Military IoT Systems." IEEE Communications Magazine 58, no. 8 (August 2020): 14–20. http://dx.doi.org/10.1109/mcom.001.2000342.
Full textDarwesh, Aso M., and Ramyar Abdolrahman Teimoor. "Node Detection and Tracking in Smart Cities Based on Internet of Things and Machine Learning." UHD Journal of Science and Technology 3, no. 1 (May 26, 2019): 30. http://dx.doi.org/10.21928/uhdjst.v3n1y2019.pp30-38.
Full textPopescu, Vasile Florin. "From Human Body Digitization to Internet of Bodies toward a New Dimension of Military Operations." Land Forces Academy Review 24, no. 3 (September 1, 2019): 242–49. http://dx.doi.org/10.2478/raft-2019-0029.
Full textR.M, Pranav. "Smart Logistics and Supply Chain with Machine Learning and IoT." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 25, 2021): 2180–84. http://dx.doi.org/10.22214/ijraset.2021.35216.
Full textPirozmand, Poria, Mohsen Angoraj Ghafary, Safieh Siadat, and Jiankang Ren. "Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory." Wireless Communications and Mobile Computing 2020 (November 14, 2020): 1–9. http://dx.doi.org/10.1155/2020/8819545.
Full textBorza, Paul Nicolae, Mihai Machedon-Pisu, and Felix Hamza-Lup. "Design of Wireless Sensors for IoT with Energy Storage and Communication Channel Heterogeneity." Sensors 19, no. 15 (July 31, 2019): 3364. http://dx.doi.org/10.3390/s19153364.
Full textJaniszewski, Marek, Anna Felkner, Piotr Lewandowski, Marcin Rytel, and Hubert Romanowski. "Automatic Actionable Information Processing and Trust Management Towards Safer Internet of Things." Sensors 21, no. 13 (June 25, 2021): 4359. http://dx.doi.org/10.3390/s21134359.
Full textPanduri, Bharathi, Madhurika Vummenthala, Spoorthi Jonnalagadda, Garwandha Ashwini, Naruvadi Nagamani, and Amanagati Akhila. "Dynamics and an efficient malware detection system using opcode sequence graph generation and ml algorithm." E3S Web of Conferences 184 (2020): 01009. http://dx.doi.org/10.1051/e3sconf/202018401009.
Full textAlromih, Arwa, Mznah Al-Rodhaan, and Yuan Tian. "A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications." Sensors 18, no. 12 (December 9, 2018): 4346. http://dx.doi.org/10.3390/s18124346.
Full textFurtak, Zieliński, and Chudzikiewicz. "A Framework for Constructing a Secure Domain of Sensor Nodes." Sensors 19, no. 12 (June 21, 2019): 2797. http://dx.doi.org/10.3390/s19122797.
Full textDei, Michele, Joan Aymerich, Massimo Piotto, Paolo Bruschi, Francisco del Campo, and Francesc Serra-Graells. "CMOS Interfaces for Internet-of-Wearables Electrochemical Sensors: Trends and Challenges." Electronics 8, no. 2 (January 31, 2019): 150. http://dx.doi.org/10.3390/electronics8020150.
Full textHao, Shuai, Beiyi An, Hu Wen, Xu Ma, and Keping Yu. "A Heterogeneous Image Fusion Method Based on DCT and Anisotropic Diffusion for UAVs in Future 5G IoT Scenarios." Wireless Communications and Mobile Computing 2020 (June 27, 2020): 1–11. http://dx.doi.org/10.1155/2020/8816818.
Full textKharchenko, S. G., and N. K. Zhizhin. "Fifth Generation of Wireless Networks (5G): Problems and Risks." Ecology and Industry of Russia 24, no. 12 (December 1, 2020): 58–65. http://dx.doi.org/10.18412/1816-0395-2020-12-58-65.
Full textTappari, Sunitha, and K. Sridevi. "Review on lightweight hardware architectures for the crypt-analytics in FPGA." International Journal of Engineering & Technology 7, no. 3 (August 22, 2018): 1888. http://dx.doi.org/10.14419/ijet.v7i3.14138.
Full text