[HTML][HTML] Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions
E Altulaihan, MA Almaiah, A Aljughaiman - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) interconnects physical and virtual objects embedded with
sensors, software, and other technologies, which exchange data using the Internet. This …
sensors, software, and other technologies, which exchange data using the Internet. This …
[HTML][HTML] Analysis of IoT security challenges and its solutions using artificial intelligence
The Internet of Things (IoT) is a well-known technology that has a significant impact on many
areas, including connections, work, healthcare, and the economy. IoT has the potential to …
areas, including connections, work, healthcare, and the economy. IoT has the potential to …
[HTML][HTML] Smart Agricultural–Industrial Crop-Monitoring System Using Unmanned Aerial Vehicle–Internet of Things Classification Techniques
Unmanned aerial vehicles (UAVs) coupled with machine learning approaches have
attracted considerable interest from academicians and industrialists. UAVs provide the …
attracted considerable interest from academicians and industrialists. UAVs provide the …
Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems
Y Liu, L Xu, S Yang, D Zhao, X Li - Computers & Security, 2024 - Elsevier
The challenge faced by industrial control systems is that they are vulnerable to adversarial
sample attacks. In the ICS field, the challenge with adversarial sample attacks is that the …
sample attacks. In the ICS field, the challenge with adversarial sample attacks is that the …
Original Research Article From tradition to innovation: The telecommunications metamorphosis with AI and advanced technologies
K Slimani, S Khoulji, A Mortreau… - Journal of Autonomous …, 2024 - jai.front-sci.com
Businesses in the telecommunications industry provide global communication using a
variety of channels, including but not limited to mobile phones, landlines, satellites, the …
variety of channels, including but not limited to mobile phones, landlines, satellites, the …
Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation
The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …
driven infrastructure that highly relies on smart sensing devices (ie, blood pressure monitors …
Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization …
The cloud computing environment has been severely harmed by security issues, which has
a negative impact on the healthy and sustainable development of the cloud. Intrusion …
a negative impact on the healthy and sustainable development of the cloud. Intrusion …
[HTML][HTML] A Novel Approach for Improving the Security of IoT–Medical Data Systems Using an Enhanced Dynamic Bayesian Network
IoT (Internet of Things) devices are increasingly being used in healthcare to collect and
transmit patient data, which can improve patient outcomes and reduce costs. However, this …
transmit patient data, which can improve patient outcomes and reduce costs. However, this …
Importance of the Information Environment Factor in Assessing a Country's Economic Security in the Digital Economy.
SO Iskajyan, IA Kiseleva, AM Tramova… - … Journal of Safety & …, 2022 - search.ebscohost.com
The purpose of the article is to analyze the influence of the information environment factor on
the assessment of a country's economic security in the digital economy. This work is devoted …
the assessment of a country's economic security in the digital economy. This work is devoted …
Comparative eco-efficiency assessment of cybersecurity solutions
J Akana, BM Islam, K Patel, I Saini… - Environmental Impact …, 2023 - Elsevier
The heavy reliance on information and communication technology (ICT) has prompted the
importance of cyber security more than ever in history. Although there are various studies …
importance of cyber security more than ever in history. Although there are various studies …