Performance analysis of blockchain-enabled security and privacy algorithms in connected and autonomous vehicles: a comprehensive review

R Khan, A Mehmood, C Maple… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Strategic investment (s) in vehicle automation technologies led to the rapid development of
technology that revolutionised transport services and reduced fatalities on a scale never …

Confidential computing in cloud/fog-based Internet of Things scenarios

DCG Valadares, NC Will, MA Spohn… - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly present in people's daily lives,
collecting different types of data about the environment, user behavior, medical data, and …

[PDF][PDF] Neural Cryptography with Fog Computing Network for Health Monitoring Using IoMT.

G Ravikumar, K Venkatachalam, MA AlZain… - Comput. Syst. Sci …, 2023 - cdn.techscience.cn
Sleep apnea syndrome (SAS) is a breathing disorder while a person is asleep. The
traditional method for examining SAS is Polysomnography (PSG). The standard procedure …

Acoustical observation with multiple wave gliders for internet of underwater things

H Lan, Y Lv, J Jin, J Li, D Sun… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
One of the challenges of Internet of Underwater Things (IoUT) is the design of nodes for
collecting information from underwater, with features of low cost, long term, long range …

Application of machine learning for ransomware detection in IoT devices

RO Ogundokun, JB Awotunde, S Misra… - Artificial intelligence for …, 2021 - Springer
Internet users have been faced with a lot of threats with the growth of malware around the
world. Ransomware, one of the significant types of malware, encrypts sensitive information …

A review of detection of pest problem in rice farming by using blockchain and IoT technologies

T Hidayat, R Mahardiko - Journal of Computer Networks …, 2021 - jurnal.itscience.org
Pest can be a serious topic in agricultural areas especially rice plantations. The pest
destroys the plants before harvesting time. Because of the presence of the pest, the yield of …

Advancement of deep learning in big data and distributed systems

AS Ahmed, MS Abood… - 2021 3rd international …, 2021 - ieeexplore.ieee.org
Digital computing space has grown dramatically since the beginning of the 2000s to deal
with an increase in data proliferation. These come from a wide variety area. For example, the …

Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things

T Wang, T Tang, Z Cai, K Fang, J Tian, J Li… - ACM Transactions on …, 2024 - dl.acm.org
The Medical Internet of Things (MIoT) requires extreme information and communication
security, particularly for remote consultation systems. MIoT's integration of physical and …

Role of blockchain technology in digital forensics

K Kaushik, S Dahiya, R Sharma - Blockchain Technology, 2022 - taylorfrancis.com
Blockchain is a progression of associated information structures called blocks, which contain
or track all that occurs in disseminated frameworks in a distributed organization. Each block …

Trust based intrusion detection system to detect insider attacks in IoT systems

KN Ambili, J Jose - Information Science and Applications: ICISA 2019, 2019 - Springer
IoT systems are vulnerable to various cyber attacks as they form a subset of the Internet.
Insider attacks find more significance since many devices are configured to access the …