[HTML][HTML] Cybersecurity Risk Analysis in the IoT: A Systematic Review
TS AlSalem, MA Almaiah, A Lutfi - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising
significant concerns about future cybersecurity risks and the need for reliable solutions. This …
significant concerns about future cybersecurity risks and the need for reliable solutions. This …
[HTML][HTML] A survey on the security of low power wide area networks: Threats, challenges, and potential solutions
KO Adefemi Alimi, K Ouahada, AM Abu-Mahfouz… - Sensors, 2020 - mdpi.com
Low power wide area network (LPWAN) is among the fastest growing networks in Internet of
Things (IoT) technologies. Owing to varieties of outstanding features which include long …
Things (IoT) technologies. Owing to varieties of outstanding features which include long …
[HTML][HTML] Injection attack detection using machine learning for smart IoT applications
Smart cities are a rapidly growing IoT application. These smart cities mainly rely on wireless
sensors to connect their different components (smart devices) together. Smart cities rely on …
sensors to connect their different components (smart devices) together. Smart cities rely on …
[HTML][HTML] A brief review on Internet of Things, Industry 4.0 and cybersecurity
The advance of industrialization regarding the optimization of production to obtain greater
productivity and consequently generate more profits has led to the emergence of Industry …
productivity and consequently generate more profits has led to the emergence of Industry …
[HTML][HTML] IoT network security using autoencoder deep neural network and channel access algorithm
Abstract Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information
retrieval, medical analysis, traffic management, etc. These applications require continuous …
retrieval, medical analysis, traffic management, etc. These applications require continuous …
Security analysis of a digital twin framework using probabilistic model checking
Digital Twins (DTs) have been gaining popularity in various applications, such as smart
manufacturing, smart energy, smart mobility, and smart healthcare. In simple terms, DT is …
manufacturing, smart energy, smart mobility, and smart healthcare. In simple terms, DT is …
An inductive analysis of collaborative cybersecurity management capabilities, relational antecedents and supply chain cybersecurity parameters
Purpose The vulnerability of customers to malware attacks through weak supplier links has
prompted a need for collaboration as a strategic alternative in improving supply chain …
prompted a need for collaboration as a strategic alternative in improving supply chain …
Guaranteeing information integrity and access control in smart cities through blockchain
The distributed devices in a smart city are characterized by different degrees of sensitivity.
Some of them can be accessed by everyone whereas others are limited to a specific class of …
Some of them can be accessed by everyone whereas others are limited to a specific class of …
[HTML][HTML] Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves
Security and efficiency remain a serious concern for Internet of Things (IoT) environments
due to the resource-constrained nature and wireless communication. Traditional schemes …
due to the resource-constrained nature and wireless communication. Traditional schemes …
[HTML][HTML] Multicriteria group decision making for prioritizing IoT risk factors with linear diophantine fuzzy sets and MARCOS method
In a dynamic world of technological advances, the Internet of Things (IoT) is a
transformational and widespread force that has revolutionized the way we communicate with …
transformational and widespread force that has revolutionized the way we communicate with …