Data privacy and security in it: a review of techniques and challenges
OA Farayola, OL Olorunfemi, PO Shoetan - Computer Science & IT …, 2024 - fepbl.com
In today's interconnected digital world, data privacy and security have emerged as
paramount concerns for individuals, organizations, and governments alike. This review …
paramount concerns for individuals, organizations, and governments alike. This review …
Digital marketing in the age of iot: a review of trends and impacts
GN Okorie, CA Udeh, EM Adaga… - International Journal of …, 2024 - fepbl.com
This paper presents a comprehensive review of the evolving landscape of digital marketing
in the era of the Internet of Things (IoT). As IoT technology continues to permeate various …
in the era of the Internet of Things (IoT). As IoT technology continues to permeate various …
An efficient cloud-integrated distributed deep neural network framework for IoT malware classification
MRB Mosleh, S Sharifian - Future Generation Computer Systems, 2024 - Elsevier
The proliferation of interconnected devices in the Internet of Things (IoT) landscape has
introduced significant security concerns. With the integration of android devices, the …
introduced significant security concerns. With the integration of android devices, the …
[HTML][HTML] Bypassing Heaven's Gate Technique Using Black-Box Testing
In recent years, the number and sophistication of malware attacks on computer systems
have increased significantly. One technique employed by malware authors to evade …
have increased significantly. One technique employed by malware authors to evade …
A forensic framework to improve digital image evidence administration in IIoT✰
The extensive growth of Industrial Internet of Things (IIoT) has prompted cyber attackers to
commence a variety of attacks which need to be identified to maintain the security of …
commence a variety of attacks which need to be identified to maintain the security of …
A comprehensive survey on internet of things security: challenges and solutions
N Karankar, A Seth - … and Sustainable Informatics: Proceedings of ICMCSI …, 2023 - Springer
Abstract Internet of Things (IoT) is a group of self-contained objects, which is a brand-new
pattern that incorporates the current existence of various devices. It is one of the most recent …
pattern that incorporates the current existence of various devices. It is one of the most recent …
[HTML][HTML] Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
The security landscape of Internet of Things (IoT) networks continues to draw significant
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …
attention from recent networks; the Version Number Attack (VNA) stands out as a prominent …
IoT Security, Future Challenges, and Open Issues
N Tariq, T Saboor, M Ashraf, R Butt… - … Measures for Logistics …, 2024 - igi-global.com
The internet of things (IoT) refers to the network of connected devices embedded in
everyday objects that enable digital transformation. The rapid proliferation of IoT devices has …
everyday objects that enable digital transformation. The rapid proliferation of IoT devices has …
[HTML][HTML] Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset
Abstract The Internet of Things (IoT) has radically reformed various sectors and industries,
enabling unprecedented levels of connectivity and automation. However, the surge in the …
enabling unprecedented levels of connectivity and automation. However, the surge in the …
Comprehensive Security for IoT Devices with Kubernetes and Raspberry Pi Cluster
Environmental monitoring systems have gained prominence across diverse applications,
necessitating the integration of cutting-edge technologies. This article comprehensively …
necessitating the integration of cutting-edge technologies. This article comprehensively …