Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review

M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …

Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions

E Altulaihan, MA Almaiah, A Aljughaiman - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) interconnects physical and virtual objects embedded with
sensors, software, and other technologies, which exchange data using the Internet. This …

Internet of things: Device capabilities, architectures, protocols, and smart applications in healthcare domain

MM Islam, S Nooruddin, F Karray… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Nowadays, the Internet has spread to practically every country around the world and is
having unprecedented effects on people's lives. The Internet of Things (IoT) is getting more …

Towards secure and intelligent internet of health things: A survey of enabling technologies and applications

U Zaman, Imran, F Mehmood, N Iqbal, J Kim, M Ibrahim - Electronics, 2022 - mdpi.com
With the growth of computing and communication technologies, the information processing
paradigm of the healthcare environment is evolving. The patient information is stored …

A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications

TM Ghazal, MAM Afifi, D Kalra - Solid State …, 2020 - research.skylineuniversity.ac.ae
The proposed research is based on the solutions for the Internet of Things (IoT) security
threats and vulnerability. It is cleared that IoT is playing a vital role now a day at an …

[PDF][PDF] Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment

AM Albalawi, MA Almaiah - J. Theor. Appl. Inf. Technol, 2022 - researchgate.net
ABSTRACT Despite Internet of Things (IoT) technology has a great potential to connect
devices and sensors through communication media, such as Wi-Fi, to the internet and …

Privacy-preserving blockchain framework for supply chain management: Perceptive Craving Game Search Optimization (PCGSO)

B Aljabhan, MA Obaidat - Sustainability, 2023 - mdpi.com
The fierce competition in international markets and the rapid advancements in information
technology result in shorter lead times, lower transportation capacity, and higher demand …

A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions

W Fei, H Ohno, S Sampalli - ACM Computing Surveys, 2023 - dl.acm.org
The Internet of Things (IoT) encompasses a network of physical objects embedded with
sensors, software, and data processing technologies that can establish connections and …

A Bibliometrics Analysis of Medical Internet of Things for Modern Healthcare

HS Nguyen, HC Danh, QP Ma, J Mesicek, J Hajnys… - Electronics, 2023 - mdpi.com
The integration of the Internet of Things (IoT) in healthcare has been a popular topic in
recent years. This article provides a comprehensive review of the medical IoT for healthcare …