2019 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC) 2019
DOI: 10.1109/wpmc48795.2019.9096127
|View full text |Cite
|
Sign up to set email alerts
|

IoT Security Approaches in Social Robots for Ambient Assisted Living Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…For instance, this is the case in the proposal by Bui and Chong [44], where the user communicates with the robot to access and control devices/information appliances in the smart home. Similar use cases are identified in [40][41][42]. But there are, of course, many other roles or functionalities that such robots can take on.…”
Section: Expected Servicesmentioning
confidence: 67%
See 2 more Smart Citations
“…For instance, this is the case in the proposal by Bui and Chong [44], where the user communicates with the robot to access and control devices/information appliances in the smart home. Similar use cases are identified in [40][41][42]. But there are, of course, many other roles or functionalities that such robots can take on.…”
Section: Expected Servicesmentioning
confidence: 67%
“…One example is the previously mentioned Misty-II robot (Figure 2 (Left)). Other examples are the popular Nao [37][38][39] or LuxAI's QTRobot [40][41][42]. Figure 3 shows the external aspect of these two platforms.…”
Section: Robotic Platformsmentioning
confidence: 99%
See 1 more Smart Citation
“…Extensive series of experiments were performed in order to evaluate and compare the performance of process mining to alternative commonly used detection methods, including elliptic envelope, support-vector machine, local outlier factor and isolation forest techniques, also considering the influence of the time splitting, the influence of the pre-processing clustering and the detection performance according to multiple criteria. A more thorough description of the process mining methodology used can be found in our previous work [ 45 ]. Further consideration is also given next.…”
Section: Discussionmentioning
confidence: 99%