Artículos de revistas sobre el tema "Military IoT"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Military IoT".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Sonare, Renuka Chandrakant y Dinesh V. Rojatkar. "Application OF IoT in Military Service". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31 de octubre de 2017): 794–97. http://dx.doi.org/10.31142/ijtsrd4629.
Texto completoToth, Andreas. "Internet of Things Vulnerabilities in Military Environments". Vojenské rozhledy 30, n.º 3 (8 de septiembre de 2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.
Texto completoKattimani, Miss Jyoti G. "Military Health System using IOT". International Journal for Research in Applied Science and Engineering Technology 7, n.º 4 (30 de abril de 2019): 2889–94. http://dx.doi.org/10.22214/ijraset.2019.4486.
Texto completoL., Kirubakaran, Sangeetha G., Rathna Priya y Sudharsan S. "Military Surveillance System using IOT". International Journal of Computer Applications 176, n.º 15 (15 de abril de 2020): 27–31. http://dx.doi.org/10.5120/ijca2020920067.
Texto completoLu, Ye, Chao Xie y Li Shang. "Study on the Transformation of Military Logistical of Internet of Things Era". Applied Mechanics and Materials 596 (julio de 2014): 119–22. http://dx.doi.org/10.4028/www.scientific.net/amm.596.119.
Texto completoCha, Sungyong, Seungsoo Baek, Sooyoung Kang y Seungjoo Kim. "Security Evaluation Framework for Military IoT Devices". Security and Communication Networks 2018 (3 de julio de 2018): 1–12. http://dx.doi.org/10.1155/2018/6135845.
Texto completoKumar K S, Yashwanth y Dr Narasimha Murthy M S. "Design of Monitor Individuals Health using IOT A IOT Application for Military Area". International Journal of Innovative Science and Research Technology 5, n.º 6 (3 de julio de 2020): 693–98. http://dx.doi.org/10.38124/ijisrt20jun291.
Texto completoPopescu, Florin. "From the IoT to the IoBT. The Path to Superior Situational Understanding". Land Forces Academy Review 24, n.º 4 (1 de diciembre de 2019): 276–82. http://dx.doi.org/10.2478/raft-2019-0034.
Texto completoJung, Seung-hoon, Jae-choon An, Jin-young Park, Yong-tae Shin y Jong-bae Kim. "An Empirical Study of the Military IoT Security Priorities". International Journal of Security and Its Applications 10, n.º 8 (31 de agosto de 2016): 13–22. http://dx.doi.org/10.14257/ijsia.2016.10.8.02.
Texto completoIyer, Brijesh y Niket Patil. "IoT enabled tracking and monitoring sensor for military applications". International Journal of System Assurance Engineering and Management 9, n.º 6 (19 de julio de 2018): 1294–301. http://dx.doi.org/10.1007/s13198-018-0727-8.
Texto completoJaya, Iksan, Edy Maryanto, Alexander Victor Bukit y Muhamad Zulkifli. "DESIGN AND DEVELOPMENT OF EARLY HEAT STROKE DETECTION SYSTEM IN MILITARY CROSS COUNTRY BASED ON IoT". JOURNAL ASRO 9, n.º 2 (22 de diciembre de 2018): 141. http://dx.doi.org/10.37875/asro.v9i2.241.
Texto completoPreda, Marius. "Digital Forensics of Internet of Things Smart Heating System Investigation". Journal of Military Technology 3, n.º 1 (26 de junio de 2020): 23–28. http://dx.doi.org/10.32754/jmt.2020.1.04.
Texto completoKim, Bruce y Sang-Bock Cho. "3D TSV-based Inductor Design for a Secure Internet of Things". International Symposium on Microelectronics 2016, n.º 1 (1 de octubre de 2016): 000364–67. http://dx.doi.org/10.4071/isom-2016-wp53.
Texto completoE. Abel, Edje, Abd Latiff Muhammad Shafie y Weng Howe Chan. "Deployment of internet of things-based cloudlet-cloud for surveillance operations". IAES International Journal of Artificial Intelligence (IJ-AI) 10, n.º 1 (1 de marzo de 2021): 24. http://dx.doi.org/10.11591/ijai.v10.i1.pp24-34.
Texto completoAl-Duwairi, Basheer, Wafaa Al-Kahla, Mhd Ammar AlRefai, Yazid Abedalqader, Abdullah Rawash y Rana Fahmawi. "SIEM-based detection and mitigation of IoT-botnet DDoS attacks". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 2 (1 de abril de 2020): 2182. http://dx.doi.org/10.11591/ijece.v10i2.pp2182-2191.
Texto completoShree Gowri Santhosh .V, Vishal .E, Vishak .R y Dr. K. Rahimunnisa. "LoRa-IoT Focused System of Defense for Equipped Troops [LIFE]". Journal of Ubiquitous Computing and Communication Technologies 2, n.º 3 (18 de septiembre de 2020): 153–77. http://dx.doi.org/10.36548/jucct.2020.3.005.
Texto completoLakshmi Narayanan, K., G. P. Ramesh y V. Divya. "Robust and brittle secured video for IOT". International Journal of Engineering & Technology 7, n.º 2.20 (18 de abril de 2018): 93. http://dx.doi.org/10.14419/ijet.v7i2.20.11762.
Texto completoCharan Patel, Bhagwati, Ram Shankar Tripathi y Naveen Goel. "IoT an Overview: Advantage, Disadvantage and Applications". International Journal of Computer Applications Technology and Research 10, n.º 05 (6 de mayo de 2021): 119–22. http://dx.doi.org/10.7753/ijcatr1005.1003.
Texto completoShahid, Huniya, Munam Ali Shah, Ahmad Almogren, Hasan Ali Khattak, Ikram Ud Din, Neeraj Kumar y Carsten Maple. "Machine Learning-based Mist Computing Enabled Internet of Battlefield Things". ACM Transactions on Internet Technology 21, n.º 4 (30 de noviembre de 2021): 1–26. http://dx.doi.org/10.1145/3418204.
Texto completoAhmed, Hassan I., Abdurrahman A. Nasr, Salah M. Abdel-Mageid y Heba K. Aslan. "DADEM". International Journal of Ambient Computing and Intelligence 12, n.º 1 (enero de 2021): 114–39. http://dx.doi.org/10.4018/ijaci.2021010105.
Texto completoGonzález-Landero, Franks, Iván García-Magariño, Raquel Lacuesta y Jaime Lloret. "ABS-DDoS: An Agent-Based Simulator about Strategies of Both DDoS Attacks and Their Defenses, to Achieve Efficient Data Forwarding in Sensor Networks and IoT Devices". Wireless Communications and Mobile Computing 2018 (24 de junio de 2018): 1–11. http://dx.doi.org/10.1155/2018/7264269.
Texto completoGuan, Qing-yang y Wu Shuang. "Signal Detection in Satellite-Ground IoT Link Based on Blind Neural Network". Wireless Communications and Mobile Computing 2021 (6 de mayo de 2021): 1–10. http://dx.doi.org/10.1155/2021/5547989.
Texto completoLagkas, Thomas, Vasileios Argyriou, Stamatia Bibi y Panagiotis Sarigiannidis. "UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things”". Sensors 18, n.º 11 (17 de noviembre de 2018): 4015. http://dx.doi.org/10.3390/s18114015.
Texto completoInomoto, Hikaru, Sachio Saiki, Masahide Nakamura y Shinsuke Matsumoto. "Design and evaluation of mission-oriented sensing platform with military analogy". International Journal of Pervasive Computing and Communications 13, n.º 1 (3 de abril de 2017): 76–91. http://dx.doi.org/10.1108/ijpcc-01-2017-0007.
Texto completoKh., Teeba Ismail y Ibrahim I. Hamarash. "Model-Based Quality Assessment of Internet of Things Software Applications: A Systematic Mapping Study". International Journal of Interactive Mobile Technologies (iJIM) 14, n.º 09 (17 de junio de 2020): 128. http://dx.doi.org/10.3991/ijim.v14i09.13431.
Texto completoKumar Dwivedi, Anshu, Awadhesh Kumar Sharma y Pawan Singh Mehra. "Energy Efficient Sensor Node Deployment Scheme for Two Stage Routing Protocol of Wireless Sensor Networks assisted IoT". ECTI Transactions on Electrical Engineering, Electronics, and Communications 18, n.º 2 (31 de agosto de 2020): 158–69. http://dx.doi.org/10.37936/ecti-eec.2020182.240541.
Texto completoKarthik, M. y M. Krishnan. "Securing an Internet of Things from Distributed Denial of Service and Mirai Botnet Attacks Using a Novel Hybrid Detection and Mitigation Mechanism". International Journal of Intelligent Engineering and Systems 14, n.º 1 (28 de febrero de 2021): 113–23. http://dx.doi.org/10.22266/ijies2021.0228.12.
Texto completoAftab, Muhammad Umar, Ariyo Oluwasanmi, Abdullah Alharbi, Osama Sohaib, Xuyun Nie, Zhiguang Qin y Son Tung Ngo. "Secure and dynamic access control for the Internet of Things (IoT) based traffic system". PeerJ Computer Science 7 (10 de mayo de 2021): e471. http://dx.doi.org/10.7717/peerj-cs.471.
Texto completoSaleh, Mohammed. "WSNs and IoT Their Challenges and applications for Healthcare and Agriculture: A Survey". 3D SCEEER Conference sceeer, n.º 3d (1 de julio de 2020): 37–43. http://dx.doi.org/10.37917/ijeee.sceeer.3rd.6.
Texto completoKang, James Jin, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi y Paul Haskell-Dowland. "No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design". IEEE Access 8 (2020): 201498–515. http://dx.doi.org/10.1109/access.2020.3035812.
Texto completoMadhiarasan, M. "Design and development of IoT based solar powered versatile moving robot for military application". International Journal of System Assurance Engineering and Management 12, n.º 3 (16 de abril de 2021): 437–50. http://dx.doi.org/10.1007/s13198-021-01089-9.
Texto completoS, Swathi y Yogish H K. "Secure data aggregation in IoT using Efficient-CSDA". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 6 (1 de diciembre de 2019): 4889. http://dx.doi.org/10.11591/ijece.v9i6.pp4889-4897.
Texto completoKumar, Dinesh y Dr. S. Smys. "An Efficient Packet Delivery Scheme Using Trust Routing in G.9959 Protocol in a Wireless Sensor Network". Journal of Ubiquitous Computing and Communication Technologies 2, n.º 3 (21 de julio de 2020): 118–25. http://dx.doi.org/10.36548/jucct.2020.3.001.
Texto completoG V, Abhishek. "Autonomous Intelligent POD for Military Purpose". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (14 de junio de 2021): 839–48. http://dx.doi.org/10.22214/ijraset.2021.35068.
Texto completoKang, James Jin Won y Henry Larkin. "Inference of Personal Sensors in the Internet of Things". International Journal of Information, Communication Technology and Applications 2, n.º 1 (26 de enero de 2016): 1–23. http://dx.doi.org/10.17972/ijicta20162125.
Texto completoFeng, Yuan, Menglin Li, Chengyi Zeng y Hongfu Liu. "Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective". Entropy 22, n.º 10 (16 de octubre de 2020): 1166. http://dx.doi.org/10.3390/e22101166.
Texto completoPradhan, Manas y Josef Noll. "Security, Privacy, and Dependability Evaluation in Verification and Validation Life Cycles for Military IoT Systems". IEEE Communications Magazine 58, n.º 8 (agosto de 2020): 14–20. http://dx.doi.org/10.1109/mcom.001.2000342.
Texto completoDarwesh, Aso M. y Ramyar Abdolrahman Teimoor. "Node Detection and Tracking in Smart Cities Based on Internet of Things and Machine Learning". UHD Journal of Science and Technology 3, n.º 1 (26 de mayo de 2019): 30. http://dx.doi.org/10.21928/uhdjst.v3n1y2019.pp30-38.
Texto completoPopescu, Vasile Florin. "From Human Body Digitization to Internet of Bodies toward a New Dimension of Military Operations". Land Forces Academy Review 24, n.º 3 (1 de septiembre de 2019): 242–49. http://dx.doi.org/10.2478/raft-2019-0029.
Texto completoR.M, Pranav. "Smart Logistics and Supply Chain with Machine Learning and IoT". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (25 de junio de 2021): 2180–84. http://dx.doi.org/10.22214/ijraset.2021.35216.
Texto completoPirozmand, Poria, Mohsen Angoraj Ghafary, Safieh Siadat y Jiankang Ren. "Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory". Wireless Communications and Mobile Computing 2020 (14 de noviembre de 2020): 1–9. http://dx.doi.org/10.1155/2020/8819545.
Texto completoBorza, Paul Nicolae, Mihai Machedon-Pisu y Felix Hamza-Lup. "Design of Wireless Sensors for IoT with Energy Storage and Communication Channel Heterogeneity". Sensors 19, n.º 15 (31 de julio de 2019): 3364. http://dx.doi.org/10.3390/s19153364.
Texto completoJaniszewski, Marek, Anna Felkner, Piotr Lewandowski, Marcin Rytel y Hubert Romanowski. "Automatic Actionable Information Processing and Trust Management Towards Safer Internet of Things". Sensors 21, n.º 13 (25 de junio de 2021): 4359. http://dx.doi.org/10.3390/s21134359.
Texto completoPanduri, Bharathi, Madhurika Vummenthala, Spoorthi Jonnalagadda, Garwandha Ashwini, Naruvadi Nagamani y Amanagati Akhila. "Dynamics and an efficient malware detection system using opcode sequence graph generation and ml algorithm". E3S Web of Conferences 184 (2020): 01009. http://dx.doi.org/10.1051/e3sconf/202018401009.
Texto completoAlromih, Arwa, Mznah Al-Rodhaan y Yuan Tian. "A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications". Sensors 18, n.º 12 (9 de diciembre de 2018): 4346. http://dx.doi.org/10.3390/s18124346.
Texto completoFurtak, Zieliński y Chudzikiewicz. "A Framework for Constructing a Secure Domain of Sensor Nodes". Sensors 19, n.º 12 (21 de junio de 2019): 2797. http://dx.doi.org/10.3390/s19122797.
Texto completoDei, Michele, Joan Aymerich, Massimo Piotto, Paolo Bruschi, Francisco del Campo y Francesc Serra-Graells. "CMOS Interfaces for Internet-of-Wearables Electrochemical Sensors: Trends and Challenges". Electronics 8, n.º 2 (31 de enero de 2019): 150. http://dx.doi.org/10.3390/electronics8020150.
Texto completoHao, Shuai, Beiyi An, Hu Wen, Xu Ma y Keping Yu. "A Heterogeneous Image Fusion Method Based on DCT and Anisotropic Diffusion for UAVs in Future 5G IoT Scenarios". Wireless Communications and Mobile Computing 2020 (27 de junio de 2020): 1–11. http://dx.doi.org/10.1155/2020/8816818.
Texto completoKharchenko, S. G. y N. K. Zhizhin. "Fifth Generation of Wireless Networks (5G): Problems and Risks". Ecology and Industry of Russia 24, n.º 12 (1 de diciembre de 2020): 58–65. http://dx.doi.org/10.18412/1816-0395-2020-12-58-65.
Texto completoTappari, Sunitha y K. Sridevi. "Review on lightweight hardware architectures for the crypt-analytics in FPGA". International Journal of Engineering & Technology 7, n.º 3 (22 de agosto de 2018): 1888. http://dx.doi.org/10.14419/ijet.v7i3.14138.
Texto completo