1 |
Q. Jiang, X. Zhang, and J. You, "SnO2: a wonderful electron transport layer for perovskite solar cells," Small, vol. 14, no. 31, p. 1801154, 2018.
DOI
|
2 |
D. Berdik, S. Otoum, N. Schmidt, D. Porter, and Y. Jararweh, "A survey on blockchain for information systems management and security," Inf. Process. \& Manag., vol. 58, no. 1, p. 102397, 2021.
DOI
|
3 |
Y. Zhang and J. Wen, "An IoT electric business model based on the protocol of bitcoin," in 2015 18th international conference on intelligence in next generation networks, 2015, pp. 184-191.
|
4 |
M. Ben Ayed, A. Massaoudi, and S. A. Alshaya, "Smart Recognition COVID-19 System to Predict Suspicious Persons Based on Face Features," J. Electr. Eng. Technol., pp. 1-6, 2021.
|
5 |
A. R. Harish, X. L. Liu, R. Y. Zhong, and G. Q. Huang, "Log-flock: A blockchain-enabled platform for digital asset valuation and risk assessment in E-commerce logistics financing," Comput. \& Ind. Eng., vol. 151, p. 107001, 2021.
DOI
|
6 |
I. Yaqoob et al., "Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges," IEEE Wirel. Commun., vol. 24, no. 3, pp. 10-16, 2017.
DOI
|
7 |
P. P. Ray, "A survey on Internet of Things architectures," J. King Saud Univ. Inf. Sci., vol. 30, no. 3, pp. 291-319, 2018.
|
8 |
S. Biswas, F. Li, Z. Latif, K. Sharif, A. K. Bairagi, and S. P. Mohanty, "GlobeChain: An Interoperable Blockchain for Global Sharing of Healthcare Data-A COVID-19 Perspective," IEEE Consum. Electron. Mag., 2021.
|
9 |
C. Xenofontos, I. Zografopoulos, C. Konstantinou, A. Jolfaei, M. K. Khan, and K.-K. R. Choo, "Consumer, commercial and industrial iot (in) security: attack taxonomy and case studies," IEEE Internet Things J., 2021.
|
10 |
D. Arivudainambi, V. K. KA, and S. S. Chakkaravarthy, "LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks," Neural Comput. Appl., vol. 31, no. 5, pp. 1491-1501, 2019.
DOI
|
11 |
W. Ren, X. Wan, and P. Gan, "A double-blockchain solution for agricultural sampled data security in Internet of Things network," Futur. Gener. Comput. Syst., vol. 117, pp. 453-461, 2021.
DOI
|
12 |
J. Kolb, M. AbdelBaky, R. H. Katz, and D. E. Culler, "Core concepts, challenges, and future directions in blockchain: a centralized tutorial," ACM Comput. Surv., vol. 53, no. 1, pp. 1-39, 2020.
|
13 |
K. Christidis and M. Devetsikiotis, "Blockchains and smart contracts for the internet of things," Ieee Access, vol. 4, pp. 2292-2303, 2016.
DOI
|
14 |
A. Banotra, S. Gupta, S. K. Gupta, and M. Rashid, "Asset Security in Data of Internet of Things Using Blockchain Technology," in Multimedia Security, Springer, 2021, pp. 269-281.
|
15 |
C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other botnets," Computer (Long. Beach. Calif)., vol. 50, no. 7, pp. 80-84, 2017.
DOI
|
16 |
S. Koprda, Z. Balogh, M. Magdin, J. Reichel, and G. Molnar, "The Possibility of Creating a Low-Cost Laser Engraver CNC Machine Prototype with Platform Arduino," Acta Polytech. Hungarica, vol. 17, no. 9, 2020.
|
17 |
A. Islam and S. Y. Shin, "A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in Internet of Things," Comput. \& Electr. Eng., vol. 84, p. 106627, 2020.
DOI
|
18 |
Y. El Housni, "Introduction to the Mathematical Foundations of Elliptic Curve Cryptography," 2018.
|
19 |
A. Bora, A. Jalal, E. Price, and A. G. Dimakis, "Compressed sensing using generative models," in International Conference on Machine Learning, 2017, pp. 537-546.
|
20 |
Z. Ellouze, N. Louati, M. Ben Ayed, S. A. Alshaya, and R. Bouaziz, "Design, Implementation, and Evaluation of a Real-Time Object-Oriented Database System," Int. J. Comput. Sci. Netw. Secur., vol. 19, no. 10, pp. 125-137, 2019.
DOI
|
21 |
M. Busch, J. Westphal, and T. Mueller, "Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment," in 14th $\{$USENIX$\}$ Workshop on Offensive Technologies ($\{$WOOT$\}$ 20), 2020.
|
22 |
I. Scott, M. de Castro Neto, and F. L. Pinheiro, "Bringing trust and transparency to the opaque world of waste management with blockchain: a Polkadot parathread application," Available SSRN 3825072, 2021.
|
23 |
M. Ben Ayed, A. Massaoudi, S. A. Alshaya, and M. Abid, "System-level co-simulation for embedded systems," AIP Adv., vol. 10, no. 3, p. 35113, 2020.
DOI
|
24 |
S. K. Singh, S. Rathore, and J. H. Park, "Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence," Futur. Gener. Comput. Syst., vol. 110, pp. 721-743, 2020.
DOI
|
25 |
C. Liaskos, S. Nie, A. Tsioliaridou, A. Pitsillides, S. Ioannidis, and I. Akyildiz, "A new wireless communication paradigm through software-controlled metasurfaces," IEEE Commun. Mag., vol. 56, no. 9, pp. 162-169, 2018.
DOI
|
26 |
B. Peng, "Research On Detection Of Malicious Software," in 2021 2nd International Conference on E-Commerce and Internet Technology (ECIT), 2021, pp. 400-403.
|
27 |
S. Bouraga, "A taxonomy of blockchain consensus protocols: A survey and classification framework," Expert Syst. Appl., vol. 168, p. 114384, 2021.
DOI
|
28 |
G. Zyskind, O. Nathan, and A. Pentland, "Enigma: Decentralized computation platform with guaranteed privacy," arXiv Prepr. arXiv1506.03471, 2015.
|
29 |
N. Grech, M. Kong, A. Jurisevic, L. Brent, B. Scholz, and Y. Smaragdakis, "Madmax: Surviving out-of-gas conditions in ethereum smart contracts," Proc. ACM Program. Lang., vol. 2, no. OOPSLA, pp. 1-27, 2018.
|
30 |
A. Bahga and V. K. Madisetti, "Blockchain platform for industrial internet of things," J. Softw. Eng. Appl., vol. 9, no. 10, pp. 533-546, 2016.
DOI
|