Optimal witnessing of healthcare IoT data using blockchain logging contract
MH Chinaei, HH Gharakheili… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Verification of data generated by wearable sensors is increasingly becoming of concern to
health service providers and insurance companies. These devices are typically vulnerable …
health service providers and insurance companies. These devices are typically vulnerable …
[HTML][HTML] A systematic review of data-driven attack detection trends in IoT
The Internet of Things is perhaps a concept that the world cannot be imagined without today,
having become intertwined in our everyday lives in the domestic, corporate and industrial …
having become intertwined in our everyday lives in the domestic, corporate and industrial …
[HTML][HTML] Security and trust management in the internet of vehicles (IoV): Challenges and machine learning solutions
E Alalwany, I Mahgoub - Sensors, 2024 - mdpi.com
The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is a
subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a …
subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a …
[HTML][HTML] Collaborative blockchain-based detection of distributed denial of service attacks based on internet of things botnets
G Spathoulas, N Giachoudis, GP Damiris… - Future Internet, 2019 - mdpi.com
Internet of Things is one of the most significant latest developments in computer science. It is
common for modern computing infrastructures to partially consist of numerous low power …
common for modern computing infrastructures to partially consist of numerous low power …
Edge device identification based on federated learning and network traffic feature engineering
With the ubiquitous deployment and applications of Internet of Things (IoT), security issues
pose a critical challenge to IoT devices. External attackers often utilize vulnerable IoT …
pose a critical challenge to IoT devices. External attackers often utilize vulnerable IoT …
[PDF][PDF] Machine learning based attacks detection and countermeasures in IoT
R Zagrouba, R Alhajri - International Journal of Communication …, 2021 - core.ac.uk
While the IoT offers important benefits and opportunities for users, the technology raises
various security issues and threats. These threats may include spreading IoT botnets …
various security issues and threats. These threats may include spreading IoT botnets …
Internet of people enabled framework for evaluating performance loss and resilience of urban critical infrastructures
Critical infrastructures (CIs) such as road networks play a critical role in transporting affected
people to hospitals and shelters during disasters. Timely evaluation of road networks' …
people to hospitals and shelters during disasters. Timely evaluation of road networks' …
[HTML][HTML] A survey on the security of low power wide area networks: Threats, challenges, and potential solutions
KO Adefemi Alimi, K Ouahada, AM Abu-Mahfouz… - Sensors, 2020 - mdpi.com
Low power wide area network (LPWAN) is among the fastest growing networks in Internet of
Things (IoT) technologies. Owing to varieties of outstanding features which include long …
Things (IoT) technologies. Owing to varieties of outstanding features which include long …
Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research
Abstract As the Internet of Things (IoT) recently attains tremendous popularity, this promising
technology leads to a variety of security challenges. The traditional solutions do not fit the …
technology leads to a variety of security challenges. The traditional solutions do not fit the …
Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …
emergence of new computing paradigms that have gained importance across a wide …