A lightweight matrix factorization for recommendation with local differential privacy in big data

H Zhou, G Yang, Y Xiang, Y Bai… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The proliferation of various items recommended by Internet-based systems has resulted in
the exponential growth of the number of ratings in the big data era. Recent advances in …

Promoting information privacy protection awareness for internet of things (IoT)

P Mugariri, H Abdullah, M Garcia-Torres… - Mobile Information …, 2022 - Wiley Online Library
The Internet of Things (IoT) has had a considerable influence on our daily lives by enabling
enhanced connection of devices, systems, and services that extends beyond machine‐to …

The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures

S Volpert, P Eichhammer, F Held, T Huffert… - Future Generation …, 2023 - Elsevier
Monitoring infrastructures is a key cornerstone for both security and resilience mechanisms,
as well as, infrastructure management helping to ensure availability and reliability. Its …

Security-aware provenance for transparency in iot data propagation

FT Jaigirdar, B Tan, C Rudolph, C Bain - IEEE Access, 2023 - ieeexplore.ieee.org
A successful application of an Internet of Things (IoT) based network depends on the
accurate and successful delivery of data collected from numerous sources. A significant …

Iot security and privacy

W Detres, MM Chowdhury… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We all love buying the best new tech that comes out from Apple or Microsoft or even
Samsung. We love how their new tech crushes the boundaries on what we thought could not …

A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks

A Sharma, K Bhushan - Cluster Computing, 2024 - Springer
IoT application uses MQTT, an application layer protocol that facilitates machine-to-machine
communication using a central entity called broker. The vulnerability lies in the broker being …

How Emerging Technologies Spawn New Social Engineering Paradigms

HC Mingo - … Interventions for Business, Technology, and Healthcare, 2023 - igi-global.com
Cybersecurity criminals often use social engineering techniques to meet their objectives.
The most egregious cybersecurity attacks may be designed to get an organization to …

Internet of medical things cybersecurity vulnerabilities and medical professionals' cybersecurity awareness: a quantitative study

K Thielfoldt - 2022 - search.proquest.com
This non-experimental descriptive-correlational research design framed within the
quantitative methodology was chosen to describe IoMT device vulnerabilities and medical …

Distributed processing framework for cooperative service among edge devices

A Nakamura, K Naito… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
This paper proposes a new distributed processing framework to realize cooperative service
among edge devices. The proposed framework provides service developers with an …

TEl-IoT: A Template for Eliciting IoT Software System Requirements

SR Souza, BP Souza, AG Uchôa… - Proceedings of the XVIII …, 2022 - dl.acm.org
Context: The Internet of Things (IoT) is a network of physical objects and system connected
through mutual communication protocols. IoT systems have specific characteristics such as …