[HTML][HTML] An overview of the architecture of home energy management system as microgrids, automation systems, communication protocols, security, and cyber …

K Taghizad-Tavana, M Ghanbari-Ghalehjoughi… - Sustainability, 2022 - mdpi.com
Today, the role of smart machines in our lives is valuable. With the advancement of digital
technologies, such as the internet of things (IoT), many embedded systems have been …

Multi-criteria decision-making methods for the evaluation of the social internet of things for the potential of defining human behaviors

HU Khan, M Abbas, F Khan, S Nazir… - Computers in Human …, 2024 - Elsevier
Multi-criteria decision-making (MCDM) techniques increase evaluation performance and
make the selection process easier while lowering illogical needs and expenses for the …

[HTML][HTML] Securing internet of things using machine and deep learning methods: a survey

A Ghaffari, N Jelodari, S pouralish, N derakhshanfard… - Cluster …, 2024 - Springer
Abstract The Internet of Things (IoT) is a vast network of devices with sensors or actuators
connected through wired or wireless networks. It has a transformative effect on integrating …

Users sentiment analysis using artificial intelligence-based FinTech data fusion in financial organizations

S Khan, HU Khan, S Nazir, B Albahooth… - Mobile Networks and …, 2023 - Springer
Innovative applications surprised the research communities in the 21st by presenting in
diverse domains. Financial technology (FinTech) is an example of these innovative …

NeuroHealth Guardian: A Novel Hybrid Approach for Precision Brain Stroke Prediction and Healthcare Analytics

U Islam, G Mehmood, AA Al-Atawi, F Khan… - Journal of Neuroscience …, 2024 - Elsevier
Stroke is a severe illness, that requires early stroke detection and intervention, as this would
help prevent the worsening of the condition. The research is done to solve stroke prediction …

New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation

M Adil, HU Khan, M Arif, MS Nawaz, F Khan - IEEE Access, 2024 - ieeexplore.ieee.org
Physical Layer-based Secret Key Generation (PLSKG) between the legitimate nodes from
the reciprocal wireless channel is a vastly studied area of Physical Layer Security (PLS) …

[HTML][HTML] RSU cluster deployment and collaboration storage of IoV based blockchain

C Chen, S Quan - Sustainability, 2022 - mdpi.com
The Internet of Vehicles is increasingly becoming an indispensable platform to make
interactions among vehicles, humans, and roadside infrastructures, and it is continuing to …

[HTML][HTML] Deep Learning-Based Location Spoofing Attack Detection and Time-of-Arrival Estimation through Power Received in IoT Networks

W Aldosari - Sensors, 2023 - mdpi.com
In the context of the Internet of Things (IoT), location-based applications have introduced
new challenges in terms of location spoofing. With an open and shared wireless medium, a …

Review of the Literature on Using Machine and Deep Learning Techniques to Improve IoT Security

A Khang, Y Singh, D Barak - Revolutionizing Automated Waste …, 2024 - igi-global.com
The current work discusses the concept of the internet of things (IoT) and its implications on
various domains, highlighting the challenges and security concerns associated with its …

Finding Security Gaps and Vulnerabilities in IoT Devices

K Singh, M Yadav, Y Singh, D Barak - … Automated Waste Treatment …, 2024 - igi-global.com
The internet of things (IoT) and wireless sensor networks (WSNs) have become important
innovations, offering unparalleled connectivity and pervasive data access for a variety of …