Articles with "based attacks" as a keyword



Photo by arthurbizkit from unsplash

Blockchain Technologies for the Internet of Things: Research Issues and Challenges

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2018.2882794

Abstract: This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then,… read more here.

Keywords: internet things; based attacks; blockchain; blockchain technologies ... See more keywords
Photo by headwayio from unsplash

EM Monitoring and Classification of IEMI and Protocol-Based Attacks on IEEE 802.11n Communication Networks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Electromagnetic Compatibility"

DOI: 10.1109/temc.2019.2900262

Abstract: The development of connected devices and their daily use is presently at the origin of the omnipresence of Wi-Fi wireless networks. However, these Wi-Fi networks are often vulnerable, and can be used by malicious people… read more here.

Keywords: communication; based attacks; protocol; protocol based ... See more keywords