Data privacy and security in it: a review of techniques and challenges

OA Farayola, OL Olorunfemi, PO Shoetan - Computer Science & IT …, 2024 - fepbl.com
In today's interconnected digital world, data privacy and security have emerged as
paramount concerns for individuals, organizations, and governments alike. This review …

Digital marketing in the age of iot: a review of trends and impacts

GN Okorie, CA Udeh, EM Adaga… - International Journal of …, 2024 - fepbl.com
This paper presents a comprehensive review of the evolving landscape of digital marketing
in the era of the Internet of Things (IoT). As IoT technology continues to permeate various …

An efficient cloud-integrated distributed deep neural network framework for IoT malware classification

MRB Mosleh, S Sharifian - Future Generation Computer Systems, 2024 - Elsevier
The proliferation of interconnected devices in the Internet of Things (IoT) landscape has
introduced significant security concerns. With the integration of android devices, the …

[HTML][HTML] Bypassing Heaven's Gate Technique Using Black-Box Testing

SJ Hwang, A Utaliyeva, JS Kim, YH Choi - Sensors, 2023 - mdpi.com
In recent years, the number and sophistication of malware attacks on computer systems
have increased significantly. One technique employed by malware authors to evade …

A forensic framework to improve digital image evidence administration in IIoT✰

D Rani, NS Gill, P Gulia - Journal of Industrial Information Integration, 2024 - Elsevier
The extensive growth of Industrial Internet of Things (IIoT) has prompted cyber attackers to
commence a variety of attacks which need to be identified to maintain the security of …

A comprehensive survey on internet of things security: challenges and solutions

N Karankar, A Seth - … and Sustainable Informatics: Proceedings of ICMCSI …, 2023 - Springer
Abstract Internet of Things (IoT) is a group of self-contained objects, which is a brand-new
pattern that incorporates the current existence of various devices. It is one of the most recent …

[HTML][HTML] Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion

HSA Belkhira, M Belkheir, M Rouissat… - Open Information …, 2024 - degruyter.com
The security landscape of Internet of Things (IoT) networks continues to draw significant
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …

IoT Security, Future Challenges, and Open Issues

N Tariq, T Saboor, M Ashraf, R Butt… - … Measures for Logistics …, 2024 - igi-global.com
The internet of things (IoT) refers to the network of connected devices embedded in
everyday objects that enable digital transformation. The rapid proliferation of IoT devices has …

[HTML][HTML] Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset

V Choudhary, S Tanwar, T Choudhury, K Kotecha - MethodsX, 2024 - Elsevier
Abstract The Internet of Things (IoT) has radically reformed various sectors and industries,
enabling unprecedented levels of connectivity and automation. However, the surge in the …

Comprehensive Security for IoT Devices with Kubernetes and Raspberry Pi Cluster

IC Donca, OP Stan, M Misaros, A Stan, L Miclea - Electronics, 2024 - mdpi.com
Environmental monitoring systems have gained prominence across diverse applications,
necessitating the integration of cutting-edge technologies. This article comprehensively …