A survey on metaverse: Fundamentals, security, and privacy
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully
immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to …
immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to …
Industry 5.0: A survey on enabling technologies and potential applications
Industry 5.0 is regarded as the next industrial evolution, its objective is to leverage the
creativity of human experts in collaboration with efficient, intelligent and accurate machines …
creativity of human experts in collaboration with efficient, intelligent and accurate machines …
Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions
N Moustafa, N Koroniotis, M Keshk… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research
attention in recent years, aiming to provide interpretability and confidence to the inner …
attention in recent years, aiming to provide interpretability and confidence to the inner …
Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT
B Jia, X Zhang, J Liu, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With rapid growth in data volume generated from different industrial devices in IoT, the
protection for sensitive and private data in data sharing has become crucial. At present …
protection for sensitive and private data in data sharing has become crucial. At present …
AI-empowered fog/edge resource management for IoT applications: A comprehensive review, research challenges and future perspectives
The proliferation of ubiquitous Internet of Things (IoT) sensors and smart devices in several
domains embracing healthcare, Industry 4.0, transportation and agriculture are giving rise to …
domains embracing healthcare, Industry 4.0, transportation and agriculture are giving rise to …
Industrial internet of things (IIoT): opportunities, challenges, and requirements in manufacturing businesses in emerging economies
Abstract Industry 4.0, often known as the Industrial Internet of Things (IIoT), offers
manufacturing businesses tremendous financial prospects and challenges. In this empirical …
manufacturing businesses tremendous financial prospects and challenges. In this empirical …
[HTML][HTML] Smart healthcare IoT applications based on fog computing: architecture, applications and challenges
The history of human development has proven that medical and healthcare applications for
humanity always are the main driving force behind the development of science and …
humanity always are the main driving force behind the development of science and …
[HTML][HTML] Artificial intelligence-based cyber security in the context of industry 4.0—a survey
AJG De Azambuja, C Plesker, K Schützer, R Anderl… - Electronics, 2023 - mdpi.com
The increase in cyber-attacks impacts the performance of organizations in the industrial
sector, exploiting the vulnerabilities of networked machines. The increasing digitization and …
sector, exploiting the vulnerabilities of networked machines. The increasing digitization and …
Deep learning in security of internet of things
Y Li, Y Zuo, H Song, Z Lv - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology is increasingly prominent in the current stage of social
development. All walks of life have begun to implement the IoT integration technology, so as …
development. All walks of life have begun to implement the IoT integration technology, so as …
X-IIoTID: A connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of Things
M Al-Hawawreh, E Sitnikova… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the
devices and connectivity protocols they deploy. They are easy to compromise and, as they …
devices and connectivity protocols they deploy. They are easy to compromise and, as they …