Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm

S Rajeyyagari - Journal of Experimental & Theoretical Artificial …, 2023 - Taylor & Francis
Smart devices and people existing on the internet are connected to smart objects or things in
the Internet of Things (IoT) technology. To protect the user information, it is required to detect …

Qualitative Delphi Study: Gaining Consensus on Cybersecurity Frameworks for Software Supply Chain Defense

JR Wellington - 2023 - search.proquest.com
Abstract In 2020, the SolarWinds Orion software supply chain compromise became known
for its high-impact cyber intrusion, catching many organizations and software supply chain …

Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners.

M Botto-Tobar, S Rehan… - Journal of Cybersecurity …, 2023 - search.ebscohost.com
Cyberthreat proliferation parallels the rapid surge in smart home usage. While having
everything in one place is convenient, it also increases your home's vulnerability to cyber …

Analysis and Validation of Lightweight Authentication Algorithm.

P Salankar, V Avasthi… - Ingénierie des Systèmes d …, 2022 - search.ebscohost.com
Abstract The Constrained Application Protocol (CoAP) is extensively used in several
industrial Internet of Things (IoT) applications. Using heavy-weight algorithms is not feasible …

[PDF][PDF] 14 Addressing Cybersecurity Issues

M Daud, R Rasiah - Digitalization and Development, 2023 - library.oapen.org
The adoption of digital technologies has become a national agenda in Malaysia, where the
Fourth Industrial Revolution (IR4. 0) technologies are increasingly promoted to contribute …

AUTONOMOUS SYSTEMS IN TOURISM: APPLICATION OF SWARM ROBOTICS TECHNOLOGY FOR OPERATIONAL OPTIMIZATION IN INDONESIAN TOURIST …

I Sulistiani, S Syarifuddin, CI Erliana… - INTERNATIONAL …, 2024 - injole.joln.org
Tourism in Indonesia continues to evolve as a vital sector in the economy, yet faces complex
challenges in optimizing operational efficiency at tourist destinations. This research explores …

Semi-quantum two-way authentication protocol between control centers and neighborhood gateways in smart grids

Q Zhang, K Zhang, K Hou, L Zhang - 2024 - researchsquare.com
To counteract the potential threat posed by quantum computers in the grid industry and
ensure the secure facilitation of two-way communication within smart grids, the development …

[图书][B] Barriers to Adoption of Advanced Cybersecurity Tools in Organizations

RT Anthony - 2023 - search.proquest.com
Abstract Information security is an adversarial process that takes advantage of cutting-edge
technology for attack and defense. Increasingly, new forms of criminal activity and the most …

6 Layer-Based Security

M Muhammad, A Sajid, H Arshad - Cyber Security for Next …, 2024 - books.google.com
The IoT is an inter-networking of things such as sensors, actuators, smart devices, intelligent
systems, or anything consisting of transducers embedded in or connected via the Internet for …

A Study of the Perceptions of Last-Mile Delivery Towards the Adoption of IoT

AA Khairuddin, EAP Akhir, NA Osman… - … Conference on Emerging …, 2022 - Springer
The rapid growth of Malaysia's e-commerce industry has caused the logistics industry to
serve a rapidly increasing number of customers, mainly in the last-mile delivery sector. Thus …