Iot commercial and industrial applications and AI-powered IoT
KA Nagaty - Frontiers of Quality Electronic Design (QED) AI, IoT and …, 2023 - Springer
This chapter introduces an overview on the commercial and industrial applications. The goal
is to provide a comprehensive overview of IoT applications commercially and industrially …
is to provide a comprehensive overview of IoT applications commercially and industrially …
A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities
B Alotaibi - Sensors, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …
Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing …
Dynamic feature dataset for ransomware detection using machine learning algorithms
JA Herrera-Silva, M Hernández-Álvarez - Sensors, 2023 - mdpi.com
Ransomware-related cyber-attacks have been on the rise over the last decade, disturbing
organizations considerably. Developing new and better ways to detect this type of malware …
organizations considerably. Developing new and better ways to detect this type of malware …
A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments
S Sasikala, S Janakiraman - Wireless Personal Communications, 2023 - Springer
Abstract Internet of Things (IoT) is the recent digital trend that connects the physical and
virtual world. The strong bonding between the people, objects, machines and the web are …
virtual world. The strong bonding between the people, objects, machines and the web are …
Ransomware-as-a-Weapon (RaaW): A Futuristic Approach for Understanding Malware as a Social Weapon
The use of information technology has widened in the past few years. With the evolving IT
industries and infrastructure comes an ocean of development and opportunities and a series …
industries and infrastructure comes an ocean of development and opportunities and a series …
Synthesis of evidence on existing and emerging social engineering ransomware attack vectors
A Bello, A Maurushat - … Issues, Challenges, and Solutions in the …, 2023 - igi-global.com
As the threat landscape continues to evolve, users are becoming less aware, ignorant, or
negligent, putting their confidential data at risk. Users easily fall prey to socially engineered …
negligent, putting their confidential data at risk. Users easily fall prey to socially engineered …
Security and Privacy in the Internet of Medical Things (IoMT)
R Kiran, A Kumbhare, PK Thakur… - … Artificial Intelligence and …, 2023 - igi-global.com
IoMT is primarily used to collect very sensitive individual health information; its security and
privacy are critical in protecting the patient's life, which may otherwise have a negative …
privacy are critical in protecting the patient's life, which may otherwise have a negative …
Toward improving the security of IoT and CPS devices: An AI approach
Detecting anomalously behaving devices in security-and-safety-critical applications is an
important challenge. This article presents an off-device methodology for detecting the …
important challenge. This article presents an off-device methodology for detecting the …
Scope of IoT in Emerging Engineering Technology during Online Education
Physical objects with built-in sensors, processors, software, and other technologies that can
communicate with one another and share data via the web are what the IoT refers to …
communicate with one another and share data via the web are what the IoT refers to …
[PDF][PDF] Permission-based android malware detection using machine learning
S Seraj - 2023 - research.brighton.ac.uk
Mobile devices, particularly Android-based devices, have become essential to our daily
lives. However, this trend has also increased the number and sophistication of mobile …
lives. However, this trend has also increased the number and sophistication of mobile …