A review of blockchain-based applications and challenges

P Sharma, R Jindal, MD Borah - Wireless Personal Communications, 2022 - Springer
The deployment of blockchain technologies for multiple use cases has been widely
investigated in the academic and business sectors over the last few years. The blockchain …

Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions

AA Alfa, JK Alhassan, OM Olaniyi, M Olalere - Journal of Reliable …, 2021 - Springer
The growth of Internet of Things (IoT) took center stage universally due their capability to
advance the course of human lives. Consequent upon this, several challenges were thrown …

Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges

R Nath, HV Nath - Computers and Electrical Engineering, 2022 - Elsevier
As an emerging technology, the Internet of Things (IoT) is revolutionizing the global
economy and society. The wide adoption of IoT opens up new security and privacy …

Deep learning methods for malware and intrusion detection: A systematic literature review

R Ali, A Ali, F Iqbal, M Hussain… - Security and …, 2022 - Wiley Online Library
Android and Windows are the predominant operating systems used in mobile environment
and personal computers and it is expected that their use will rise during the next decade …

Federated learning for intrusion detection in IoT security: a hybrid ensemble approach

S Chatterjee, MK Hanawal - … of Internet of Things and Cyber …, 2022 - inderscienceonline.com
Critical role of the internet of things (IoT) in various domains like smart city, healthcare,
supply chain, and transportation has made them the target of malicious attacks. Past works …

[HTML][HTML] Monitoring real time security attacks for IoT systems using DevSecOps: a systematic literature review

A Bahaa, A Abdelaziz, A Sayed, L Elfangary, H Fahmy - Information, 2021 - mdpi.com
In many enterprises and the private sector, the Internet of Things (IoT) has spread globally.
The growing number of different devices connected to the IoT and their various protocols …

[HTML][HTML] Hybrid logical security framework for privacy preservation in the green internet of things

I Batra, S Verma, A Malik, Kavita, U Ghosh… - Sustainability, 2020 - mdpi.com
Lately, the Internet of Things (IoT) has opened up new opportunities to business and
enterprises; however, the cost of providing security and privacy best practices is preventing …

Cost-sensitive stacked auto-encoders for intrusion detection in the Internet of Things

A Telikani, AH Gandomi - Internet of Things, 2021 - Elsevier
Abstract Intrusion Detection System (IDS) is an important tool for protecting the Internet of
Things (IoT) networks against cyber-attacks. Traditional IDSs can only distinguish between …

Security and provenance for Internet of Health Things: A systematic literature review

B Bai, S Nazir, Y Bai, A Anees - Journal of Software: Evolution …, 2021 - Wiley Online Library
Abstract Internet of Health Things (IoHT) is an extension of the Internet of Things (IoT), which
plays an important role in the observation, consultation, monitoring, and treatment process of …

The role of cybersecurity in smart cities

A Khan, NZ Jhanjhi, M Humayun - Cyber Security Applications for …, 2022 - taylorfrancis.com
As cities are considered to be developed places where ample opportunities are rampant for
individuals to grow economically and professionally, mass migration is taking place from …