[HTML][HTML] A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability

KY Najmi, MA AlZain, M Masud, NZ Jhanjhi… - Materials Today …, 2023 - Elsevier
The idea of the Internet of Things that everything is linked to anything and everything
interacts with the other is a great idea, and that the topic of integrating these devices will add …

Cloud intrusion detection framework using variational auto encoder Wasserstein generative adversarial network optimized with archerfish hunting optimization …

G Senthilkumar, K Tamilarasi, JK Periasamy - Wireless Networks, 2023 - Springer
The cloud computing environment has been severely harmed by security issues, which has
a negative impact on the healthy and sustainable development of the cloud. Intrusion …

Data privasi dan keamanan siber pada smart-city: Tinjauan literatur

DAS Ilhami - Jurnal Sains, Nalar, Dan Aplikasi Teknologi Informasi, 2022 - journal.uii.ac.id
Perkembangan teknologi yang seiring tahun semakin canggih sehingga membuat
digitalisasi menjadi perbincangan utama. Tidak kalah utama, maka dari itu sistem dalam …

Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism

AO Almagrabi - Expert Systems, 2023 - Wiley Online Library
In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to
take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay …

Challenges and vulnerability assessment of cybersecurity in IoT-enabled SC

AQ Raheema - Wireless Networks, 2023 - Springer
Abstract Integrating the Internet of Things (IoT) into urban infrastructure has reached critical
mass as the movement toward Smart City (SC) development has gained momentum …

A comprehensive survey of Internet of Things security challenges and possible solutions

SM Alnemari - Turkish Journal of Computer and Mathematics …, 2021 - turcomat.org
Abstract The Internet of Things (IoT) is considered as one of the greatest significant fields of
future technology. It is aimed to join anyone with anything at anywhere. IoT will play a critical …

Awareness of Security Threats in Social Media

A Alsubhi - Turkish Journal of Computer and Mathematics …, 2021 - turcomat.org
Social media are sites on the Internet that allow users to interact and communicate with each
other and since it is easy to use and produce a fast way to communicate. According to these …

Fuzzy optimization based detection of attacker nodes in wireless networks using deep neural network

J Daniel, JT Anita Rose… - Concurrency and …, 2022 - Wiley Online Library
Nowadays, information security attacks are emerging as the main threat to network behavior.
The deployment of sensor nodes in the open environment will be subjected to various kinds …

A Systematic Review to Evaluating Cyber Security Attacks in Smart Cities

P Kaur, M Giri, R Kaur - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Nowadays every all are heavily depended upon digital technology. As the development
takesplace, the rate of cyber crimes also increases. Hence, it is a huge challenge for IT …

[PDF][PDF] Wireless Sensor Networks in Landslide Detection: A Review of Related Literature

K Fernando - 2021 - researchgate.net
Wireless Sensor Network (WSN) is a network made up of sensor nodes composed of a
group of transducers with communication infrastructure commonly for monitoring and …