A survey on emerging security issues, challenges, and solutions for Internet of things (IoTs)

A Khan, D Peraković - Advances in Malware and Data-Driven …, 2022 - igi-global.com
The internet of things is a cutting-edge technology that is vulnerable to all sorts of fictitious
solutions. As a new phase of computing emerges in the digital world, it intends to produce a …

Enhancing Supply Chain Traceability through Blockchain and IoT Integration: A Comprehensive Review

EKS Wong, HY Ting, AF Atanda - Green Intelligent Systems …, 2024 - tecnoscientifica.com
Supply chain traceability is essential for ensuring safety, preventing counterfeit goods, and
improving efficiency. The integration of blockchain technology and the Internet of Things …

Analysis of IoT pattern descriptions

H Washizaki, A Hazeyama, T Okubo… - 2021 IEEE/ACM 3rd …, 2021 - ieeexplore.ieee.org
IoT architecture and design patterns document the successes in IoT systems and software
design. Although these patterns are often described based on well-accepted common …

[HTML][HTML] An adaptable Intelligence Algorithm to a Cybersecurity Framework for IIOT

S Ordoñez-Tumbo, K Márceles-Villalba… - Ingeniería y …, 2022 - scielo.org.co
The industrial internet of things (IIoT) has grown in recent years, which makes it possible to
publicize recent technological innovations and be able to integrate them with each other …

An Efficient IoT Security Solution Using Deep Learning Mechanisms

M Venkatesh, M Srinu, VK Gudivada, BB Dash… - … : Proceedings of ICDIC …, 2022 - Springer
The Internet has become an inextricable element of human life, and the number of Internet-
connected gadgets is rapidly growing. Internet of Things (IoT) gadgets, in particular, has …

[PDF][PDF] Internet of Things

BK Mohanta, D Jena, SS Panda, S Sobhanayak - 2019 - condor.depaul.edu
abstract Blockchain Technology has received a lot of attention from both industry and
academia due to its decentralized, persistency, anonymity and auditability properties. In this …

Intrusion detection system as audit in IoT infrastructure using ensemble learning and SMOTE method

AA Kurniawan, HA Santoso… - … on Science in …, 2019 - ieeexplore.ieee.org
With the industrial revolution 4.0, the use of IoT-based systems is increasing, both in the field
of health manufacturing, urban planning, housing, and even automotive. Therefore, the …

Enhancing Network Security: Leveraging Isolation Forest for Malware Detection

JA Pawar, MS Avhankar, A Gupta… - … on Advancement in …, 2024 - ieeexplore.ieee.org
In this work it has been shown that the growth of computer attacks continues to advance
constantly, as well as the large number of vulnerability detection and protection tools that …

IdO, apprentissage profond et cybersécurité dans la maison connectée: une étude

M ATIEH, O MOHAMMAD, A SABRA… - Cybersécurité des …, 2024 - books.google.com
Développer la domotique repose sur un médium qui soutient la communication et la
coopération entre appareils. Pour ce faire, il faut suivre une méthode pour implémenter et …

Exploring IoT Frameworks: An In-Depth Analysis and Survey of Security Protocols

NR Chandrika, DL Arya - Available at SSRN 4746559, 2024 - papers.ssrn.com
The security issues associated with IoT applications are often not properly addressed due to
the complexity of the IoT threat landscape. One of the most critical factors that can be …