[go: up one dir, main page]

Ijaz et al., 2016 - Google Patents

Smart cities: A survey on security concerns

Ijaz et al., 2016

View PDF
Document ID
14705625466923777542
Author
Ijaz S
Shah M
Khan A
Ahmed M
Publication year
Publication venue
International Journal of Advanced Computer Science and Applications

External Links

Snippet

A smart city is developed, deployed and maintained with the help of Internet of Things (IoT). The smart cities have become an emerging phenomena with rapid urban growth and boost in the field of information technology. However, the function and operation of a smart city is …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00127Acquiring and recognising microscopic objects, e.g. biological cells and cellular parts
    • G06K9/0014Pre-processing, e.g. image segmentation ; Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/4642Extraction of features or characteristics of the image by performing operations within image blocks or by using histograms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/38Quantising the analogue image signal, e.g. histogram thresholding for discrimination between background and foreground patterns
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N27/00Investigating or analysing materials by the use of electric, electro-chemical, or magnetic means
    • G01N27/26Investigating or analysing materials by the use of electric, electro-chemical, or magnetic means by investigating electrochemical variables; by using electrolysis or electrophoresis
    • G01N27/416Systems
    • G01N27/447Systems using electrophoresis

Similar Documents

Publication Publication Date Title
Ijaz et al. Smart cities: A survey on security concerns
Hamid et al. Cyber security issues and challenges for smart cities: A survey
Siwakoti et al. Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures
Srivastava et al. Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects
Alferidah et al. A review on security and privacy issues and challenges in internet of things
Yang et al. Privacy and security aspects of E-government in smart cities
Mosenia et al. A comprehensive study of security of internet-of-things
Ahmad et al. Survey on IoT: Security threats and applications
Gupta et al. RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey
Kuntke et al. LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios
Zahra et al. Fuzzy logic and fog based secure architecture for internet of things (flfsiot)
Mogadem et al. A survey on internet of energy security: related fields, challenges, threats and emerging technologies
Almuqren Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions
Wisdom et al. Industrial IoT security infrastructures and threats
Saeed et al. Data-driven techniques and security issues in wireless networks
Reddy et al. A comprehensive survey of internet of things applications, threats, and security issues
Li et al. A fog‐based collaborative intrusion detection framework for smart grid
Anthi Detecting and defending against cyber attacks in a smart home Internet of Things ecosystem
Narayana et al. An efficient methodology for avoiding threats in smart homes with low power consumption in iot environment using blockchain technology
Alrubaiei et al. Internet of Things in Cyber Security Scope
Abbasi et al. Security of IoT application layer: Requirements, threats, and solutions
Kaushik et al. Internet of Things and Cyber Physical Systems: Security and Forensics
Saini et al. A survey on security threats and network vulnerabilities in Internet of Things
Rios et al. Location privacy in wireless sensor networks
Ula et al. Towards the secure Internet of Things: Threats and solution