Deep learning algorithms for cybersecurity applications: A technological and status review

P Dixit, S Silakari - Computer Science Review, 2021 - Elsevier
Cybersecurity mainly prevents the hardware, software, and data present in the system that
has an active internet connection from external attacks. Organizations mainly deploy …

Towards a secure 5G-enabled Internet of Things: A survey on requirements, privacy, security, challenges, and opportunities

SF Ahmed, MSB Alam, S Afrin, SJ Rafa, SB Taher… - IEEE …, 2024 - ieeexplore.ieee.org
5G and the Internet of Things (IoT) are a potent combination that offers a vast IoT
infrastructure that can support billions of connected devices while maintaining reliability …

[HTML][HTML] A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats …

MA Obaidat, S Obeidat, J Holst, A Al Hayajneh… - Computers, 2020 - mdpi.com
The Internet of Things (IoT) has experienced constant growth in the number of devices
deployed and the range of applications in which such devices are used. They vary widely in …

Effective intrusion detection system for IoT using optimized capsule auto encoder model

CU Om Kumar, J Durairaj… - Concurrency and …, 2022 - Wiley Online Library
Abstract Intrusion Detection Systems (IDS) play a major part in protecting security threats
and networks from attacks. Due to the rapid development of the internet of things (IoT), more …

[PDF][PDF] IoT-based Application of Information Security Triad.

A Reshan, M Saleh - International Journal of Interactive …, 2021 - pdfs.semanticscholar.org
Information Security is the foremost concern for IoT (Internet of things) devices and
applications. Since the advent of IoT, its applications and devices have experienced an …

Energy Harvesting Techniques for Future IoT Applications

N Vithyalakshmi, GS Vinoth, HD Praveena… - … the Internet of Things …, 2022 - taylorfrancis.com
Nowadays, many investments are made within the Internet of Things. All electronic gadgets
like personal computers and smartphones are not only connected through the internet, its …

IoT Security Issues, Challenges, Threats, and Solutions in Healthcare Applications

S Hallur, R Kulkarni, PP Patavardhan… - … AI in IoT Analytics on the …, 2022 - igi-global.com
A majority of the applications now go wireless involving IoT as a technology to communicate
to their respective destination. IoT is considered as a future of internet. The internet of things …

New Hybrid Distributed Attack Detection System for IoT

Ç Bakır - Bitlis Eren Üniversitesi Fen Bilimleri Dergisi - dergipark.org.tr
IoT is expressed as a network of physical objects with applications and various technologies
that provide data connection and sharing with various devices and systems over the Internet …

Data Security and Privacy

B Awojobi, J Ding - Cybersecurity for Information Professionals, 2020 - api.taylorfrancis.com
Data security is about the technology and policy for protecting confidentiality, integrity, and
availability of data during its entire life cycle. The emerging of big data and Internet of Things …

Introduction, Security Challenges, and Threats in IoT

S Hallur, R Kulkarni, P Patavardhan - Internet of Things, 2020 - taylorfrancis.com
Applications that involve wireless communications are highly prone to security risks. Majority
of the applications now go wireless involving the Internet of Things (IoT) as a technology to …