Skip to content
Snippets Groups Projects
Select Git revision
  • 055ade648e3fdc5a780c5096d33072bd8bab4104
  • main default protected
2 results

hivatkozasok.bib

Blame
  • hivatkozasok.bib 13.58 KiB
    @thesis{bizt-rendszerek,
    	author = {Török Krisztián Antal},
    	title = {Biztonságtechnikai rendszerek üzemeltetése-karbantartása},
    	type = {szakdolgozat},
    	year = {2024},
    	month = nov,
    	institution = {Debreceni Egyetem Műszaki Kar Gépészmérnök Tanszék},
    	url = {https://hdl.handle.net/2437/386296},
    	urldate = {2025-04-10},
    }
    
    @manual{dsc,
    	author = {{DSC Hungária Kft.}},
    	title = {PowerSeries Neo Riasztó Központok - Részletes Építészeti és Mérnöki
    			műszaki leírás},
    	url = {
    			https://dsc.hu/themes/frontend/documents/muszaki_leiras_a_powerseries_neo_riaszto_kozpontokrol_v12.pdf
    		},
    	urldate = {2025-04-15},
    }
    
    @manual{paradox,
    	author = {{Paradox}},
    	title = {MG5050+ Installation Guide},
    	url = {https://www.paradox.com/Downloader?ID=11643},
    	urldate = {2025-04-15},
    }
    
    @online{ring,
    	author = {{Ring LLC}},
    	title = {Technical specifications for Ring Alarm devices},
    	url = {
    			https://ring.com/gb/en/support/articles/x9gba/Technical-Specifications-for-Ring-Alarm-Devices
    		},
    	urldate = {2025-04-15},
    }
    
    @manual{zwave-spec,
    	author = {{Z-Wave Alliance}},
    	title = {Application Work Group Z-Wave Specifications},
    	year = {2024},
    	month = jul,
    	url = {https://sdomembers.z-wavealliance.org/document/dl/3252},
    	urldate = {2025-04-15},
    }
    
    @manual{zigbee-spec,
    	author = {{ZigBee Alliance}},
    	title = {ZigBee Specification},
    	year = {2015},
    	month = aug,
    	abstract = {The ZigBee Specification describes the infrastructure and
    			services available to applications operating on the ZigBee
    			platform},
    	url = {
    			https://zigbeealliance.org/wp-content/uploads/2019/11/docs-05-3474-21-0csg-zigbee-specification.pdf
    		},
    	urldate = {2025-04-15},
    }
    
    @techreport{2-4-spectrum,
    	author = {Enge, Per AND Akos, Dennis AND Do, Juyong AND Simoneau, Joel B.
    			AND Pearson, L. Wilson AND Seetharam, Venkatesh AND Oria, A. J.},
    	title = {Measurements of Man-Made Spectrum Noise Floor},
    	institution = {{NASA}},
    	url = {https://ntrs.nasa.gov/citations/20050041714},
    	urldate = {2025-04-15},
    }
    
    @online{homey,
    	title = {Homey Pro - The Next Generation of Smart Home.},
    	url = {https://homey.app/en-hu/homey-pro/},
    	urldate = {2025-04-16},
    }
    
    @online{dsc-powerseries-eol,
    	title = {Discontinuation Notice - PowerSeries Product Line End of Life},
    	author = {{DSC}},
    	url = {https://cms.dsc.com/download.php?t=1&id=26516},
    	urldate = {2025-04-18},
    }
    
    @article{zigbee-reliability,
    	author = {Cheng-Min LIN},
    	journal = {IEICE TRANSACTIONS on Information},
    	title = {Reliability Analysis and Modeling of ZigBee Networks},
    	year = {2010},
    	volume = {E93-D},
    	number = {1},
    	pages = {68-78},
    	abstract = {The architecture of ZigBee networks focuses on developing
    			low-cost, low-speed ubiquitous communication between devices. The
    			ZigBee technique is based on IEEE 802.15.4, which specifies the
    			physical layer and medium access control (MAC) for a low rate
    			wireless personal area network (LR-WPAN). Currently, numerous
    			wireless sensor networks have adapted the ZigBee open standard to
    			develop various services to promote improved communication
    			quality in our daily lives. The problem of system and network
    			reliability in providing stable services has become more
    			important because these services will be stopped if the system
    			and network reliability is unstable. The ZigBee standard has
    			three kinds of networks; star, tree and mesh. The paper models
    			the ZigBee protocol stack from the physical layer to the
    			application layer and analyzes these layer reliability and mean
    			time to failure (MTTF). Channel resource usage, device role,
    			network topology and application objects are used to evaluate
    			reliability in the physical, medium access control, network, and
    			application layers, respectively. In the star or tree networks, a
    			series system and the reliability block diagram (RBD) technique
    			can be used to solve their reliability problem. However, a
    			division technology is applied here to overcome the problem
    			because the network complexity is higher than that of the others.
    			A mesh network using division technology is classified into
    			several non-reducible series systems and edge parallel systems.
    			Hence, the reliability of mesh networks is easily solved using
    			series-parallel systems through our proposed scheme. The
    			numerical results demonstrate that the reliability will increase
    			for mesh networks when the number of edges in parallel systems
    			increases while the reliability quickly drops when the number of
    			edges and the number of nodes increase for all three networks.
    			More use of resources is another factor impact on reliability
    			decreasing. However, lower network reliability will occur due to
    			network complexity, more resource usage and complex object
    			relationship.},
    	keywords = {},
    	doi = {10.1587/transinf.E93.D.68},
    	ISSN = {1745-1361},
    	month = jan,
    }
    
    @inproceedings{wifi-enc,
    	author = {Thakur, Hasnain Nizam and Al Hayajneh, Abdullah and Thakur, Kutub
    			and Kamruzzaman, Abu and Ali, Md Liakat},
    	booktitle = {2023 IEEE World AI IoT Congress (AIIoT)},
    	title = {A Comprehensive Review of Wireless Security Protocols and
    			Encryption Applications},
    	year = {2023},
    	volume = {},
    	number = {},
    	pages = {0373-0379},
    	abstract = {The evolution of technology has made our lives more convenient,
    			allowing us to communicate with anyone across the globe, access
    			data whenever we need it, and connect our devices to the
    			internet. Since a large amount of our personal data is stored on
    			computers or transmitted wirelessly, encryption has become
    			essential for ensuring the safety and privacy of this data,
    			limiting access to only authorized personnel. Encryption methods
    			have become increasingly sophisticated over time, with complex
    			computer algorithms able to process data within seconds. The
    			purpose of this paper is to provide an overview of encryption,
    			including its early forms and history, modern encryption
    			technologies such as WEP, WPA, and WPA2, and their weaknesses,
    			improvements, and applications in information technology. In
    			conclusion, this paper highlights the significance of robust
    			wireless security protocols and encryption in preserving the
    			credibility and dependability of digital networks and systems.},
    	keywords = {Computers;Protocols;Limiting;Wireless
    			networks;Encryption;Safety;Communication system
    			security;Evolution of technology;modern encryption
    			technologies;information technology;robust wireless security
    			protocols},
    	doi = {10.1109/AIIoT58121.2023.10174571},
    	ISSN = {},
    	month = jun,
    }
    
    
    @article{wired-vs-wireless,
    	title = {A survey on wired and wireless network},
    	author = {Khan, Rafaqat Alam and Tariq, Muhammad Arslan},
    	journal = {Lahore Garrison University Research Journal of Computer Science
    			and Information Technology},
    	volume = {2},
    	number = {3},
    	pages = {19--28},
    	year = {2018},
    	url = {https://core.ac.uk/download/pdf/539592395.pdf},
    	urldate = {2025-04-19},
    }
    
    @online{ring-prices,
    	author = {{security.org} AND Aliza Vigderman AND Gabe Turner},
    	title = {Ring Alarm Security System Cost and Pricing},
    	url = {https://www.security.org/home-security-systems/ring-alarm/},
    	urldate = {2025-04-19},
    }
    
    @online{homey-prices,
    	title = {Homey Cloud - Choose your Homey.},
    	url = {https://homey.app/en-us/homey-pro/#compare},
    	urldate = {2025-04-19},
    }
    
    @unpublished{hw-compat,
    	title = {The effect of compatibility on software supply and hardware demand:
    			Forward and backward compatibility},
    	author = {Nahm, Jae},
    	journal = {Dept. of Economics, Hong Kong University of Science and
    			Technology},
    	year = {2000},
    	url = {
    			http://idei.fr/sites/default/files/medias/doc/conf/sic/papers_2001/nahm.pdf
    		},
    	urldate = {2025-04-19},
    }
    
    @online{simplisafe,
    	title = {SimpiSafe Support - Help Center},
    	url = {https://support.simplisafe.com/?lang=en},
    	urldate = {2025-04-21},
    }
    
    @inproceedings{iot-usability,
    	author = {Chanda, Vignay and Hao, Luoyao and Schulzrinne, Henning},
    	booktitle = {2024 IEEE 21st Consumer Communications \& Networking Conference
    			(CCNC)},
    	title = {From Frustration to Function: A Study on Usability Challenges in
    			Smart Home IoT Devices},
    	year = {2024},
    	volume = {},
    	number = {},
    	pages = {1-6},
    	abstract = {IoT devices have significantly altered the methods of
    			interaction, operation, and functionality within home
    			environments. However, individuals, particularly those with
    			limited technical proficiency who stand to gain the most from
    			these advancements, likely encounter challenges stemming from the
    			intricate setup processes, a critical stage with the potential to
    			limit their widespread adoption. Thus, we focus on the user
    			experience during the setup phase of mainstream smart home
    			devices and conduct an empirical study of 15 representative smart
    			home IoT devices. We scrupulously examine their setup processes,
    			as well as accompanying instructions and user manuals, to assess
    			multi-faceted usability concerns. Our findings reveal 19
    			usability issues, indicating notable barriers, inconsistencies,
    			and a lack of intuitiveness, which may deter consumers from
    			successfully configuring and using these devices.},
    	keywords = {Access control;Privacy;Smart homes;Manuals;User
    			experience;Internet of Things;Usability},
    	doi = {10.1109/CCNC51664.2024.10454634},
    	ISSN = {2331-9860},
    	month = jan,
    	urldate = {2025-04-21},
    }
    
    
    @article{iot-onboard,
    	author = {Lee, Byung Moo and Patil, Mayuresh and Hunt, Preston and Khan,
    			Imran},
    	journal = {IEEE Access},
    	title = {An Easy Network Onboarding Scheme for Internet of Things Networks},
    	year = {2019},
    	volume = {7},
    	number = {},
    	pages = {8763-8772},
    	abstract = {The network onboarding of the Internet of Things (IoT) devices
    			is a practically important issue to realize the IoT networks. The
    			lack of appropriate and easy network onboarding schemes hinders
    			the spread of the IoT networks and their related cloud services.
    			To try and address this problem, various IoT network onboarding
    			schemes have been developed, such as near-field communication,
    			quick response code, ultrasound, and soft access point. In
    			addition to these schemes, a network onboarding scheme based on
    			Wi-Fi neighbor awareness networking (NAN), a recently developed
    			low-power Wi-Fi technology, has received a lot of attention due
    			to its low cost and ease-of-use characteristics. However, the
    			radio frequency characteristics of the NAN-based scheme can cause
    			various problems, including the unintended connection from
    			neighboring devices. The development of the supporting
    			technologies for the NAN-based network onboarding scheme is
    			critically important. In this paper, we propose a convergence
    			configurator detection scheme based on the time difference of
    			arrival, received signal strength indicator, and data rate to
    			reduce the neighboring issue of the NAN-based setup. Rather than
    			using one parameter criterion, we use a weighted sum of various
    			parameters to increase the reliability of the NAN-based
    			onboarding. The numerical results validate the effectiveness of
    			the proposed technique.},
    	keywords = {Wireless fidelity;Security;Internet of Things;Cloud
    			computing;Radio frequency;Received signal strength
    			indicator;Distance measurement;IoT network;network onboarding},
    	doi = {10.1109/ACCESS.2018.2890072},
    	ISSN = {2169-3536},
    	month = {},
    	urldate = {2025-04-21},
    }
    
    @inproceedings{iot-userfriendly,
    	author = {Wang, Chixiang and Cassidy, Liam and He, Weijia and Pierson,
    			Timothy J. and Kotz, David},
    	title = {Challenges and opportunities in onboarding smart-home devices},
    	year = {2024},
    	isbn = {9798400704970},
    	publisher = {Association for Computing Machinery},
    	address = {New York, NY, USA},
    	url = {https://doi.org/10.1145/3638550.3641137},
    	urldate = {2025-04-21},
    	doi = {10.1145/3638550.3641137},
    	abstract = {Smart-home devices have become integral to daily routines, but
    			their onboarding procedures - setting up a newly acquired smart
    			device into operational mode - remain understudied. The
    			heterogeneity of smart-home devices and their onboarding
    			procedure can easily overwhelm users when they scale up their
    			smart-home system. While Matter, the new IoT standard, aims to
    			unify the smart-home ecosystem, it is still evolving, resulting
    			in mixed compliance among devices. In this paper, we study the
    			complexity of device onboarding from users' perspectives. We thus
    			performed cognitive walkthroughs on 12 commercially available
    			smart-home devices, documenting the commonality and distinctions
    			of the onboarding process across these devices. We found that
    			onboarding smart home devices can often be tedious and confusing.
    			Users must devote significant time to creating an account,
    			searching for the target device, and providing Wi-Fi credentials
    			for each device they install. Matter-compatible devices are
    			supposedly easier to manage, as they can be registered through
    			one single hub independent of the vendor. Unfortunately, we found
    			such a statement is not always true. Some devices still need
    			their own companion apps and accounts to fully function. Based on
    			our observations, we give recommendations about how to support a
    			more user-friendly onboarding process.},
    	booktitle = {Proceedings of the 25th International Workshop on Mobile
    			Computing Systems and Applications},
    	pages = {60–65},
    	numpages = {6},
    	keywords = {smart-home, device onboarding, user experience, matter},
    	location = {San Diego, CA, USA},
    	series = {HotMobile '24},
    }
    
    @article{fiz-vedelem,
    	author = {Horváth, Tamás},
    	title = {Mechanikai védelem mint késleltetés a fizikai védelemben},
    	journal = {Hadmérnök},
    	volume = {16},
    	number = {1},
    	pages = {23--32},
    	year = {2021},
    	month = may,
    	doi = {10.32567/hm.2021.1.2},
    }