Ijaz et al., 2016 - Google Patents
Smart cities: A survey on security concernsIjaz et al., 2016
View PDF- Document ID
- 14705625466923777542
- Author
- Ijaz S
- Shah M
- Khan A
- Ahmed M
- Publication year
- Publication venue
- International Journal of Advanced Computer Science and Applications
External Links
Snippet
A smart city is developed, deployed and maintained with the help of Internet of Things (IoT). The smart cities have become an emerging phenomena with rapid urban growth and boost in the field of information technology. However, the function and operation of a smart city is …
- 238000005516 engineering process 0 abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00127—Acquiring and recognising microscopic objects, e.g. biological cells and cellular parts
- G06K9/0014—Pre-processing, e.g. image segmentation ; Feature extraction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/4642—Extraction of features or characteristics of the image by performing operations within image blocks or by using histograms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/38—Quantising the analogue image signal, e.g. histogram thresholding for discrimination between background and foreground patterns
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
- G01N27/00—Investigating or analysing materials by the use of electric, electro-chemical, or magnetic means
- G01N27/26—Investigating or analysing materials by the use of electric, electro-chemical, or magnetic means by investigating electrochemical variables; by using electrolysis or electrophoresis
- G01N27/416—Systems
- G01N27/447—Systems using electrophoresis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ijaz et al. | Smart cities: A survey on security concerns | |
Hamid et al. | Cyber security issues and challenges for smart cities: A survey | |
Siwakoti et al. | Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures | |
Srivastava et al. | Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects | |
Alferidah et al. | A review on security and privacy issues and challenges in internet of things | |
Yang et al. | Privacy and security aspects of E-government in smart cities | |
Mosenia et al. | A comprehensive study of security of internet-of-things | |
Ahmad et al. | Survey on IoT: Security threats and applications | |
Gupta et al. | RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey | |
Kuntke et al. | LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios | |
Zahra et al. | Fuzzy logic and fog based secure architecture for internet of things (flfsiot) | |
Mogadem et al. | A survey on internet of energy security: related fields, challenges, threats and emerging technologies | |
Almuqren | Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions | |
Wisdom et al. | Industrial IoT security infrastructures and threats | |
Saeed et al. | Data-driven techniques and security issues in wireless networks | |
Reddy et al. | A comprehensive survey of internet of things applications, threats, and security issues | |
Li et al. | A fog‐based collaborative intrusion detection framework for smart grid | |
Anthi | Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem | |
Narayana et al. | An efficient methodology for avoiding threats in smart homes with low power consumption in iot environment using blockchain technology | |
Alrubaiei et al. | Internet of Things in Cyber Security Scope | |
Abbasi et al. | Security of IoT application layer: Requirements, threats, and solutions | |
Kaushik et al. | Internet of Things and Cyber Physical Systems: Security and Forensics | |
Saini et al. | A survey on security threats and network vulnerabilities in Internet of Things | |
Rios et al. | Location privacy in wireless sensor networks | |
Ula et al. | Towards the secure Internet of Things: Threats and solution |