Skip to content
Publish & Distribute
Publishing Solutions
Distribution Solutions
Library Services
Subjects
Architecture and Design
Arts
Business and Economics
Chemistry
Classical and Ancient Near Eastern Studies
Computer Sciences
Cultural Studies
Engineering
General Interest
Geosciences
History
Industrial Chemistry
Jewish Studies
Law
Library and Information Science, Book Studies
Life Sciences
Linguistics and Semiotics
Literary Studies
Materials Sciences
Mathematics
Medicine
Music
Pharmacy
Philosophy
Physics
Social Sciences
Sports and Recreation
Theology and Religion
Publications
Journals
Books
Proceedings
Publishers
Journal Matcher
Blog
Contact
Search
English
English
Deutsch
Polski
Español
Français
Italiano
Cart
Home
Journals
Applied Mathematics and Nonlinear Sciences
Volume 9 (2024): Issue 1 (January 2024)
Open Access
Application of IoT technology in cyber security prevention system
Jiahan Dong
Jiahan Dong
State Grid Beijing Electric Power Research
Beijing, China
Search for this author on
Sciendo
|
Google Scholar
Dong, Jiahan
,
Chao Wang
Chao Wang
State Grid Beijing Electric Power Research
Beijing, China
Search for this author on
Sciendo
|
Google Scholar
Wang, Chao
,
Guangxin Guo
Guangxin Guo
State Grid Beijing Electric Power Research
Beijing, China
Search for this author on
Sciendo
|
Google Scholar
Guo, Guangxin
,
Tianyu Ren
Tianyu Ren
State Grid Beijing Electric Power Research
Beijing, China
Search for this author on
Sciendo
|
Google Scholar
Ren, Tianyu
and
Hao Sun
Hao Sun
AnHui JiYuan Inspection and Testing Technology Co., LTD
Hefei, China
Search for this author on
Sciendo
|
Google Scholar
Sun, Hao
Sep 03, 2024
Applied Mathematics and Nonlinear Sciences
Volume 9 (2024): Issue 1 (January 2024)
About this article
Previous Article
Next Article
Abstract
References
Authors
Articles in this Issue
Preview
PDF
Cite
Share
Download Cover
Published Online:
Sep 03, 2024
Received:
Mar 26, 2024
Accepted:
Jul 16, 2024
DOI:
https://doi.org/10.2478/amns-2024-2266
Keywords
Elliptic curve encryption algorithm
,
MEMM
,
Effective signal-to-noise ratio
,
UCB algorithm
,
Internet of Things technology
,
Network security prevention system
© 2024 Jiahan Dong et al., published by Sciendo
This work is licensed under the Creative Commons Attribution 4.0 International License.