Who's In Control? On Security Risks of Disjointed IoT Device Management Channels

2021 ◽  
Author(s):  
Yan Jia ◽  
Bin Yuan ◽  
Luyi Xing ◽  
Dongfang Zhao ◽  
Yifan Zhang ◽  
...  
2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2009 ◽  
Vol 5 (1) ◽  
pp. 32
Author(s):  
Melanie Maytin ◽  
Laurence M Epstein ◽  
◽  

Prior to the introduction of successful intravascular countertraction techniques, options for lead extraction were limited and dedicated tools were non-existent. The significant morbidity and mortality associated with these early extraction techniques limited their application to life-threatening situations such as infection and sepsis. The past 30 years have witnessed significant advances in lead extraction technology, resulting in safer and more efficacious techniques and tools. This evolution occurred out of necessity, similar to the pressure of natural selection weeding out the ineffective and highly morbid techniques while fostering the development of safe, successful and more simple methods. Future developments in lead extraction are likely to focus on new tools that will allow us to provide comprehensive device management and the design of new leads conceived to facilitate future extraction. With the development of these new methods and novel tools, the technique of lead extraction will continue to require operators that are well versed in several methods of extraction. Garnering new skills while remembering the lessons of the past will enable extraction technologies to advance without repeating previous mistakes.


1992 ◽  
Author(s):  
Michael D. Mumford ◽  
Theodore L. Gessner ◽  
Jennifer O'Connor ◽  
Mary S. Connelly ◽  
Timothy C. Clifton

2005 ◽  
Author(s):  
Puyan Dadvar ◽  
Kevin Skadron
Keyword(s):  

2015 ◽  
Vol 5 (3) ◽  
pp. 95-112
Author(s):  
Miroslava Kovaříková

This article deals with the issue of security management and its following application in education. The article focuses on the topic of armed attacks at schools. Based on a research probe aimed at teachers which focused on perception of security risks, there are chosen areas to which Central emergency system services should react. Further, knowledge of technical and organizational measures of emergency plans in the organization and the level of attention paid to this issue by the school management were investigated. In the text there are also international models of solutions of this issue introduced. The contribution also brings outline of how is the issue solved in the European Union countries, in particular in the Kingdom of Spain. Experience with the solution of security issues of schools in Latin America are also mentioned. In the conclusion the summary of measures for improvement of security at schools is presented.


Sign in / Sign up

Export Citation Format

Share Document