Blockchains for artificial intelligence of things: a comprehensive survey

M Shen, A Gu, J Kang, X Tang, X Lin… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
With the rapid advances in information and communication technologies, the Internet of
Things (IoT) has become large and complex, bearing tremendous amounts of data and …

[PDF][PDF] Convergence between Blockchain and the Internet of Things

A Cruz - International Journal of Technology, Innovation and …, 2021 - journals.gaftim.com
The objective of this study was to determine the effectiveness of a particular
convergencemodel for IoT and blockchain. Multiple regression model was selected to …

Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment

RF Mansour - Scientific Reports, 2022 - nature.com
Cyber physical system (CPS) is a network of cyber and physical elements, which interact
with one another in a feedback form. CPS approves critical infrastructure and is treated as …

A multi-tiered framework for insider threat prevention

RA Alsowail, T Al-Shehari - Electronics, 2021 - mdpi.com
As technologies are rapidly evolving and becoming a crucial part of our lives, security and
privacy issues have been increasing significantly. Public and private organizations have …

Blockchain-based ontology driven reference framework for security risk management

M Iqbal, A Kormiltsyn, V Dwivedi… - Data & Knowledge …, 2024 - Elsevier
Security risk management (SRM) is crucial for protecting valuable assets from malicious
harm. While blockchain technology has been proposed to mitigate security threats in …

Implementation of art therapy assisted by the internet of medical things based on blockchain and fuzzy set theory

X Lu - Information Sciences, 2023 - Elsevier
This work aims to improve the stability and efficiency of the Internet of Medical Things (IoMT),
strengthen the security and privacy of personal information, and create a healthy and safe …

Anomaly Detection in Smart Agriculture Systems on Network Edge Using Deep Learning Technique

B Alanazi, I Alrashdi - Sustainable Machine Intelligence Journal, 2023 - sciencesforce.com
With the widespread adoption of Internet of Things (IoT) technologies across various
domains, including smart agriculture, urban environments, and homes, the threat of zero-day …

Optimal weighted fusion based insider data leakage detection and classification model for Ubiquitous computing systems

E Alabdulkreem, M Alduailij, M Alduailij… - … Energy Technologies and …, 2022 - Elsevier
With the rapid growth and evolving advancement in artificial technology, Ubiquitous
computing methods plays a vital role in day to day lives. Insider threats were malicious …

Designing a blockchain approach to secure firefighting stations based Internet of things

SA Yousiff, RA Muhajjar, MH Al-Zubaidie - Informatica, 2023 - informatica.si
has been rapid and significant since it helps people do their jobs more efficiently and keeps
them fully informed of events at their homes and workplaces thanks to technology like the …

Research opportunity of insider threat detection based on machine learning methods

NTM Prajitno, H Hadiyanto… - … Conference on Artificial …, 2023 - ieeexplore.ieee.org
Insider threats have been a known threat since a long time ago in the information technology
field and many researchers tried to create novel methods to solve this threat. The purpose of …