[HTML][HTML] Cybersecurity Risk Analysis in the IoT: A Systematic Review

TS AlSalem, MA Almaiah, A Lutfi - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising
significant concerns about future cybersecurity risks and the need for reliable solutions. This …

[HTML][HTML] A survey on the security of low power wide area networks: Threats, challenges, and potential solutions

KO Adefemi Alimi, K Ouahada, AM Abu-Mahfouz… - Sensors, 2020 - mdpi.com
Low power wide area network (LPWAN) is among the fastest growing networks in Internet of
Things (IoT) technologies. Owing to varieties of outstanding features which include long …

[HTML][HTML] Injection attack detection using machine learning for smart IoT applications

T Gaber, A El-Ghamry, AE Hassanien - Physical Communication, 2022 - Elsevier
Smart cities are a rapidly growing IoT application. These smart cities mainly rely on wireless
sensors to connect their different components (smart devices) together. Smart cities rely on …

[HTML][HTML] A brief review on Internet of Things, Industry 4.0 and cybersecurity

R Rudenko, IM Pires, P Oliveira, J Barroso, A Reis - Electronics, 2022 - mdpi.com
The advance of industrialization regarding the optimization of production to obtain greater
productivity and consequently generate more profits has led to the emergence of Industry …

[HTML][HTML] IoT network security using autoencoder deep neural network and channel access algorithm

SM Ali, AS Elameer, MM Jaber - Journal of Intelligent Systems, 2021 - degruyter.com
Abstract Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information
retrieval, medical analysis, traffic management, etc. These applications require continuous …

Security analysis of a digital twin framework using probabilistic model checking

E Shaikh, AR Al-Ali, S Muhammad, N Mohammad… - IEEE …, 2023 - ieeexplore.ieee.org
Digital Twins (DTs) have been gaining popularity in various applications, such as smart
manufacturing, smart energy, smart mobility, and smart healthcare. In simple terms, DT is …

An inductive analysis of collaborative cybersecurity management capabilities, relational antecedents and supply chain cybersecurity parameters

D Friday, SA Melnyk, M Altman, N Harrison… - International Journal of …, 2024 - emerald.com
Purpose The vulnerability of customers to malware attacks through weak supplier links has
prompted a need for collaboration as a strategic alternative in improving supply chain …

Guaranteeing information integrity and access control in smart cities through blockchain

W Miloud Dahmane, S Ouchani, H Bouarfa - Journal of Ambient …, 2023 - Springer
The distributed devices in a smart city are characterized by different degrees of sensitivity.
Some of them can be accessed by everyone whereas others are limited to a specific class of …

[HTML][HTML] Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves

J Khan, C Zhu, W Ali, M Asim, S Ahmad - Information, 2024 - mdpi.com
Security and efficiency remain a serious concern for Internet of Things (IoT) environments
due to the resource-constrained nature and wireless communication. Traditional schemes …

[HTML][HTML] Multicriteria group decision making for prioritizing IoT risk factors with linear diophantine fuzzy sets and MARCOS method

V Jayakumar, J Kannan, N Kausar, M Deveci… - Granular …, 2024 - Springer
In a dynamic world of technological advances, the Internet of Things (IoT) is a
transformational and widespread force that has revolutionized the way we communicate with …