2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) 2021
DOI: 10.1109/iemtronics52119.2021.9422588
|View full text |Cite
|
Sign up to set email alerts
|

Algorithmic method of security of the Internet of Things based on steganographic coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 33 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…In [15], the use of Internet of Things technologies in ecology (using the example of the Aral Sea region) as a system is proposed (Figure 1). The system was developed as a website.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [15], the use of Internet of Things technologies in ecology (using the example of the Aral Sea region) as a system is proposed (Figure 1). The system was developed as a website.…”
Section: Resultsmentioning
confidence: 99%
“…The purpose of the research in this article is to develop effective object recognition methods to solve the identification problem in the IoT ecosystem of the Aral region. The objective of the research is to develop correct recognition algorithms based on an algebraic approach in solving the problem of identifying [11][12][13][14][15] the flow of information in the IoT ecosystem of the Aral region, which is described in detail in work [15] of the authors of this paper.…”
Section: Introductionmentioning
confidence: 99%
“…Two strategies have been devised to quantitatively model humpback whale bubble-net behavior: 1) Shrinking Encircling Mechanism: To emulate the bubble-net behavior, the parameter a Tis systematically decreased from 2 to 0 over the course of iterations, mimicking the characteristic behavior. The search agent's position is updated within a range defined by the agent's starting position and the position of the current best agent [35]. This update is accomplished by incorporating random values within the range of [-1, 1] for R effectively determining the new position of the search agent, a critical aspect in capturing the bubblenet behavior.…”
Section: ) Surrounding Preymentioning
confidence: 99%
“…include smartphones, coffee makers, washing machines, headphones, light bulbs, and more. According to the International Data Corporation (IDC), it is projected that by 2025, there will be approximately 41.6 billion IoT devices, potentially generating an enormous amount of data, estimated at 79.4 zettabytes (ZB) [61]. IoT is envisioned as a vast network that interconnects everything, including people, fostering relationships between people and devices.…”
Section: Plos Onementioning
confidence: 99%