Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network Model

D Sun, L Hu, G Wu, Y Xing, J Hu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The increased utilization of trigger-action programming (TAP) rules in smart homes has
raised concerns regarding potential security threats in the interactions between smart digital …

“It was hard to find the words”: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices

S Turner, JRC Nurse, S Li - CHI Conference on Human Factors in …, 2022 - dl.acm.org
This study considers how well an autoethnographic diary study helps as a method to explore
why families might struggle in the application of strong and cohesive cyber security …

Electronic Information And Transactions Law And Business Development In Indonesia: Confrontational Or Accommodative?

R Pakina - Komitmen: Jurnal Ilmiah Manajemen, 2023 - journal.uinsgd.ac.id
Technological developments, including online transactions, can no longer be avoided. But
unfortunately, in carrying out online transactions themselves, the consumer is often on the …

Security Challenges in 6G Networks: A Game Theory-based Intrusion Detection with Network Slicing and AI/ML Perspectives

M Gupta, RK Jha, M Sabraj - 2024 - preprints.org
The vast network of interconnected devices of the Internet of Things poses significant
security challenges, necessitating the upgrade of current wireless networks to the 6G …

UAV-Enabled Mobile RAN and RF-Energy Transfer Protocol for Enabling Sustainable IoT in Energy-Constrained Networks

A Jaiswal, S Shivateja, A Hazra… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
This article introduces a novel approach for Unmanned Aerial Vehicles (UAV) assisted
wireless power transfer (WPT) within a Radio Access Network (RAN) provisioned Internet of …

Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review

R Kaur, S Shahrestani, C Ruan - Computer Networks and …, 2024 - ojs.wiserpub.com
Abstract Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare
to monitor health data. However, when WWSN users transmit their data to healthcare …

A Trustable and Secure Usage-Based Insurance Policy Auction Mechanism and Platform Using Blockchain and Smart Contract Technologies

WY Lin, KY Tai, FYS Lin - Sensors, 2023 - mdpi.com
This study presents an architectural framework for the blockchain-based usage-based
insurance (UBI) policy auction mechanism in the internet of vehicles (IoV) applications. The …

Secured THz communication in photonic microcell networks based on spatial wave mixing of steered beams

M Che, H Chen, Y Ueda, K Kato - Optical Switching and Networking, 2024 - Elsevier
Future 6G communication systems are envisioned to expand their carrier frequency to the
THz region, where a broad unexplored region of spectrum is available. With this expansion …

A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things

U Nandhini, SVNS Kumar - International Journal of …, 2023 - inderscienceonline.com
Internet of things (IoT) is rapidly expanding, and it is having a greater impact on daily life.
The internet of things is widely applied in a wide range of industries, from small to large. IoT …

Anomaly Detection In IoT Networks Using Hybrid Method Based On PCA-XGBoost

A Taghavirashidizadeh, M Zavvar… - 2022 8th Iranian …, 2022 - ieeexplore.ieee.org
The Internet of Things is a growing network of limited and heterogeneous nodes and objects
connected to the World Wide Web despite tits local connection. With the increasing use of …