This work is licensed under the Creative Commons Attribution 4.0 International License.
Hasan, R. and R. Hasan, Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems. Future generation computer systems, 2022. 134: p. 187-203.Search in Google Scholar
Martins, I., et al., Host-based IDS: A review and open issues of an anomaly detection system in IoT. Future Generation Computer Systems, 2022. 133: p. 95-113.Search in Google Scholar
Lu, Y., P. Li and H. Xu, A Food anti-counterfeiting traceability system based on Blockchain and Internet of Things. Procedia Computer Science, 2022. 199: p. 629-636.Search in Google Scholar
Lei, N., Intelligent logistics scheduling model and algorithm based on Internet of Things technology. Alexandria Engineering Journal, 2022. 61(1): p. 893-903.Search in Google Scholar
Tournier, J., et al., A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things, 2021. 16: p. 100264.Search in Google Scholar
Ashima, R., et al., Understanding the role and capabilities of Internet of Things-enabled Additive Manufacturing through its application areas. Advanced Industrial and Engineering Polymer Research, 2021.Search in Google Scholar
Sun, C., Application of RFID Technology for Logistics on Internet of Things. AASRI Procedia, 2012. 1: p. 106-111.Search in Google Scholar
de Barros Filho, I.E., et al., A reliability and performance GSPN-Based model for anti-collision RFID algorithms under noisy channels in industrial internet of things. Computers in Industry, 2021. 125: p. 103381.Search in Google Scholar
Cirne, A., et al., IoT security certifications: Challenges and potential approaches. Computers & Security, 2022. 116: p. 102669.Search in Google Scholar
He, Y., et al., A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things. Future Generation Computer Systems, 2019. 96: p. 438-448.Search in Google Scholar
Han, G., et al., A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things. Future Generation Computer Systems, 2018. 82: p. 689-697.Search in Google Scholar
Li, W. and S. Kara, Methodology for Monitoring Manufacturing Environment by Using Wireless Sensor Networks (WSN) and the Internet of Things (IoT). Procedia CIRP, 2017. 61: p. 323-328.Search in Google Scholar
Daas, M.S., S. Chikhi and E. Bourennane, A dynamic multi-sink routing protocol for static and mobile self-organizing wireless networks: A routing protocol for Internet of Things. Ad Hoc Networks, 2021. 117: p. 102495.Search in Google Scholar
Choi, J., et al., Understanding Internet of Things malware by analyzing endpoints in their static artifacts. Computer Networks, 2022. 206: p. 108768.Search in Google Scholar
Zhou, R., et al., Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things. Information Sciences, 2019. 491: p. 251-264.Search in Google Scholar
Akhtar, P., et al., The Internet of Things, dynamic data and information processing capabilities, and operational agility. Technological Forecasting and Social Change, 2018. 136: p. 307-316.Search in Google Scholar
Liu, F., et al., Using scanning acoustic microscopy and LM-BP algorithm for defect inspection of micro solder bumps. Microelectronics Reliability, 2017. 79: p. 166-174.Search in Google Scholar
Xiong, F., et al., A blockchain-based edge collaborative detection scheme for construction internet of things. Automation in Construction, 2022. 134: p. 104066.Search in Google Scholar
Hasan, R. and R. Hasan, Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems. Future Generation Computer Systems, 2022. 134: p. 187-203.Search in Google Scholar
Vijayakumar, M. and T.S. Shiny Angel, Monitored Access Distribution Method for Finding the Abnormality in the Internet of Things Based Smart City Application. Materials Today: Proceedings, 2022.Search in Google Scholar
Kayode Saheed, Y., et al., A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal, 2022. 61(12): p. 9395-9409.Search in Google Scholar
Lin, Y., Automatic recognition of image of abnormal situation in scenic spots based on Internet of things. Image and Vision Computing, 2020. 96: p. 103908.Search in Google Scholar
Chen, Y., et al., Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing. Knowledge-Based Systems, 2022. 244: p. 108505.Search in Google Scholar
Lu, J. and X. Chen, Risk model of financial supply chain of Internet of Things enterprises: A research based on convolutional neural network. Computer Communications, 2022. 183: p. 96-106.Search in Google Scholar
Violettas, G., et al., A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks. Future Generation Computer Systems, 2021. 125: p. 698-714.Search in Google Scholar
Rasool, R.U., et al., Security and privacy of internet of medical things: A contemporary review in the age of surveil-lance, botnets, and adversarial ML. Journal of Network and Computer Applications, 2022. 201: p. 103332.Search in Google Scholar
Mousouliotis, P.G. and L.P. Petrou, CNN-Grinder: From Algorithmic to High-Level Synthesis descriptions of CNNs for Low-end-low-cost FPGA SoCs. Microprocessors and Microsystems, 2020. 73: p. 102990.Search in Google Scholar
Li, H., et al., Motor imagery EEG classification algorithm based on CNN-LSTM feature fusion network. Biomedical Signal Processing and Control, 2022. 72: p. 103342.Search in Google Scholar
Boehnke, M., et al., Diagnostic Performance of SRU and ATA Thyroid Nodule Classification Algorithms as Tested With a 1 Million Virtual Thyroid Nodule Model. Current Problems in Diagnostic Radiology, 2018. 47(1): p. 10-13.Search in Google Scholar
Patanè, L. and M.G. Xibilia, Echo-state networks for soft sensor design in an SRU process. Information Sciences, 2021. 566: p. 195-214.Search in Google Scholar