This work is licensed under the Creative Commons Attribution 4.0 International License.
Tak, A., Mhdo, B., Ghh, C., et al. (2022). Unlocking digital technologies for waste recycling in industry 4.0 era: A transformation towards a digitalization-based circular economy in Indonesia. Journal of Cleaner Production.Search in Google Scholar
Frantz, D., Hostert, P., Rufin, P., et al. (2022). Revisiting the Past: Replicability of a Historic Long-Term Vegetation Dynamics Assessment in the Era of Big Data Analytics. Remote Sensing, 14(3), 597.Search in Google Scholar
Li, J., Qiao, Z., Zhang, K., et al. (2021). A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing. Sensors, 21(1), 288.Search in Google Scholar
Liu, Y., Ren, L. (2022). The Influence of Artificial Intelligence Technology on Teaching under the Threshold of “Internet+”: Based on the Application Example of an English Education Platform. Wireless Communications and Mobile Computing.Search in Google Scholar
Sharma, A., Kaur, S., Singh, M. A. (2021). Comprehensive review on blockchain and Internet of Things in healthcare. Transactions on Emerging Telecommunications Technologies.Search in Google Scholar
Thunibat, A. A., Sawad, M. B., Almaiah, M. A., et al. (2021). Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption. Sustainability, 13.Search in Google Scholar
Wu, S., Zhang, J. (2021). Research on a Compound Dual Innovation Capability Model of Intelligent Manufacturing Enterprises. Sustainability, 13.Search in Google Scholar
Dziubinski, K., Bandai, M. (2021). Bandwidth Efficient IoT Traffic Shaping Technique for Protecting Smart Home Privacy from Data Breaches in Wireless LAN. IEICE Transactions on Communications.Search in Google Scholar
Wu, H., Hao, Y., Ren, S., et al. (2021). Does internet development improve green total factor energy efficiency? Evidence from China. Energy Policy, 112247.Search in Google Scholar
Malik, A. T., Phillips, F. M., Kim, J., et al. (2020). P111. Undergoing elective posterior lumbar fusions at “US News & World Report” ranked hospitals versus non-ranked hospitals: do rankings even matter?. The Spine Journal, 20(9), S199.Search in Google Scholar
Reisgen, U., Mann, S., Sharma, R. (2020). GMAW in the Internet of Production. Welding Journal, 99(11), 38-42.Search in Google Scholar
Wei, L. A., Zn, B., Sx, A., et al. (2021). Secure Fusion Approach for the Internet of Things in Smart Autonomous Multi-Robot Systems. Information Sciences.Search in Google Scholar
Chen, Z., Wang, H. (2022). Research on Audit Simulation of Accounting Computerization Based on Internet Complex Discrete Dynamic Modeling Technology. Mathematical Problems in Engineering.Search in Google Scholar
Anand, P., Singh, Y., Selwal, A., et al. (2020). IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids. Energies, 13.Search in Google Scholar
Fj, A., Mc, A., Wz, A., et al. (2021). Intrusion Detection on Internet of Vehicles via Combining Log-ratio Oversampling, Outlier Detection and Metric Learning. Information Sciences.Search in Google Scholar
Abbas, S. G., Vaccari, I., Hussain, F., et al. (2021). Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Sensors, 21 (Internet of Things for Smart Homes and Industrial Application).Search in Google Scholar
Jia, C., Ma, J., Liu, Q., et al. (2020). Linkboost: A Link Prediction Algorithm to Solve the Problem of Network Vulnerability in Cases Involving Incomplete Information. Complexity, 3, 1-14.Search in Google Scholar
Khan, A. M., Iqbal, N., Khan, A. A., et al. (2020). Detection of Intermediate Spoofing Attack on GNSS Receiver through Slope based Metrics. Journal of Navigation.Search in Google Scholar
Jiang, C.. (2022). Network security and ideological security based on wireless communication and big data analysis. Wireless Communications and Mobile Computing, 2022(3), 1-6.Search in Google Scholar
Mazurczyk, W., Bisson, P., Jover, R. P., et al. (2020). Challenges and Novel Solutions for 5G Network Security, Privacy and Trust. IEEE Wireless Communications, 27(4), 6-7.Search in Google Scholar
Zhang, H., Meng, X., Zhang, X., et al. (2020). CANsec: A Practical in-Vehicle Controller Area Network Security Evaluation Tool. Sensors, 20(17), 4900.Search in Google Scholar
Zhao, D., Song, H., Li, H. (2021). Fuzzy integrated rough set theory situation feature extraction of network security. Journal of Intelligent and Fuzzy Systems, 40(1), 1-12.Search in Google Scholar
Vajjha, H., Sushma, P. (2021). Techniques and Limitations in Securing the Log Files to Enhance Network Security and Monitoring. Solid State Technology, 64(2), 1-8.Search in Google Scholar
Imran, M., Bashir, F., Jafri, A., et al. (2021). A Systematic Review of Scalable Hardware Architectures for Pattern Matching in Network Security. Computers & Electrical Engineering, Pre-press(Pre-press):Pre-press.Search in Google Scholar
Zhang, R., Hu, Z. (2021). Access control method of network security authentication information based on fuzzy reasoning algorithm. Measurement, 185:110103.Search in Google Scholar
Togay, C., Kasif, A., Catal, C., et al. (2021). A Firewall Policy Anomaly Detection Framework for Reliable Network Security. IEEE Transactions on Reliability, 99, 1-9.Search in Google Scholar
Kang, Y., Zhong, J., Li, R., et al. (2021). Classification Method for Network Security Data Based on Multi-featured Extraction. International Journal on Artificial Intelligence Tools.Search in Google Scholar
Bhuiyan, T. H., Medal, H. R., Nandi, A. K., et al. (2021). Risk-averse bi-level stochastic network interdiction model for cyber-security risk management. International Journal of Critical Infrastructure Protection, 32.Search in Google Scholar
Benomar, Z., Longo, F., Merlino, G., et al. (2021). Cloud-based Network Virtualization in IoT with Open Stack. ACM Transactions on Internet Technology (TOIT).Search in Google Scholar
Henes, F. O., Stappenbeck, P., Tahir, E., et al. (2020). Implementation of a 24-Hour Teleradiology Service for Cruise Ships: A Pilot Study. American Journal of Roentgenology, 214(4), 1-7.Search in Google Scholar
Alghazzawi, D. M., Badri, S. (2022). Using the B/S Model to Design and Implement Online Shopping System for Gulf Brands. Sustainability, 14.Search in Google Scholar
Mun, H., Han, K., Dong, H. L. (2020). Ensuring Safety and Security in CAN-based Automotive Embedded Systems: A Combination of Design Optimization and Secure Communication. IEEE Transactions on Vehicular Technology, 99, 1-1.Search in Google Scholar