[HTML][HTML] Analysis of IoT security challenges and its solutions using artificial intelligence
The Internet of Things (IoT) is a well-known technology that has a significant impact on many
areas, including connections, work, healthcare, and the economy. IoT has the potential to …
areas, including connections, work, healthcare, and the economy. IoT has the potential to …
Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future
SF Ahmed, S Shuravi, A Bhuyian, S Afrin… - arXiv preprint arXiv …, 2023 - arxiv.org
Given the exponential expansion of the internet, the possibilities of security attacks and
cybercrimes have increased accordingly. However, poorly implemented security …
cybercrimes have increased accordingly. However, poorly implemented security …
[HTML][HTML] TrackInk: An IoT-enabled real-time object tracking system in space
Nowadays, there is tremendous growth in the Internet of Things (IoT) applications in our
everyday lives. The proliferation of smart devices, sensors technology, and the Internet …
everyday lives. The proliferation of smart devices, sensors technology, and the Internet …
[HTML][HTML] The Application of role-based framework in preventing internal identity theft related crimes: A qualitative case study of UK retail companies
This paper aims to examine the challenges of preventing internal identity theft related crimes
(IIDTRC) in the UK retail sector. Using an in-depth multiple case studies of a selected …
(IIDTRC) in the UK retail sector. Using an in-depth multiple case studies of a selected …
[HTML][HTML] A survey on MAC-based physical layer security over wireless sensor network
AU Rehman, MS Mahmood, S Zafar, MA Raza… - Electronics, 2022 - mdpi.com
Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical
issue in the world. Wireless sensor networks have great importance in civil and military fields …
issue in the world. Wireless sensor networks have great importance in civil and military fields …
[HTML][HTML] Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
The security landscape of Internet of Things (IoT) networks continues to draw significant
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …
Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data,
actuators that perform mechanical actions on the sensor's collected data, and gateways …
actuators that perform mechanical actions on the sensor's collected data, and gateways …
Soft Computing: Goals, importance and various problem-solving techniques
R Agrawal, O Sharma, NO Aljehane… - Journal of Integrated …, 2023 - pubs.thesciencein.org
The purpose, importance, approach, qualities, and requirement of soft computing are all
discussed in this study. Apart from that, the paper describes the work of numerous writers in …
discussed in this study. Apart from that, the paper describes the work of numerous writers in …
Blockchain-based AI Methods for Managing Industrial IoT: Recent Developments, Integration Challenges and Opportunities
Currently, Blockchain (BC), Artificial Intelligence (AI), and smart Industrial Internet of Things
(IIoT) are not only leading promising technologies in the world, but also these technologies …
(IIoT) are not only leading promising technologies in the world, but also these technologies …
Security Threat Exploration on Smart Living Style based on Twitter Data
T AlSaedi, M Mehmood, A Mahmood… - … , Technology & Applied …, 2024 - etasr.com
Abstract The Internet of Things (IoT) has revolutionized individuals' homes with smart
devices, but it has also brought security worries due to the huge amounts of data they …
devices, but it has also brought security worries due to the huge amounts of data they …