Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust

C Buck, C Olenberger, A Schweizer, F Völter… - Computers & …, 2021 - Elsevier
In response to weaknesses of current network security solutions, the zero-trust model follows
the idea that no network–whether internal or external–is trustworthy. The concept of zero …

Challenges and opportunities in securing the industrial internet of things

M Serror, S Hack, M Henze, M Schuba… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Given the tremendous success of the Internet of Things in interconnecting consumer
devices, we observe a natural trend to likewise interconnect devices in industrial settings …

Experts and intelligent systems for smart homes' Transformation to Sustainable Smart Cities: A comprehensive review

NU Huda, I Ahmed, M Adnan, M Ali, F Naeem - Expert Systems with …, 2024 - Elsevier
In this constantly evolving landscape of urbanization, the relationship between technology
and automation, in regards to sustainability, holds immense significance. The intricate …

Applications of the Internet of Things (IoT) in smart logistics: A comprehensive survey

Y Song, FR Yu, L Zhou, X Yang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Logistics is a driver of countries' and firms' competitiveness and plays a vital role in
economic growth. However, the current logistics industry still faces high costs and low …

Internet of Things-enabled smart cities: State-of-the-art and future trends

AH Alavi, P Jiao, WG Buttlar, N Lajnef - Measurement, 2018 - Elsevier
The dramatic spread of urbanization in modern cities requires smart solutions to address
critical issues such as mobility, healthcare, energy, and civil infrastructure. The Internet of …

Internet of Things security and forensics: Challenges and opportunities

M Conti, A Dehghantanha, K Franke… - Future Generation …, 2018 - Elsevier
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes
interacting autonomously while offering all sorts of services. Wide distribution, openness and …

Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning

A Azmoodeh, A Dehghantanha… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-
connected devices and nodes (eg, medical devices and wearable combat uniforms). These …

A blockchain-empowered access control framework for smart devices in green internet of things

L Tan, N Shi, K Yu, M Aloqaily, Y Jararweh - ACM Transactions on …, 2021 - dl.acm.org
Green Internet of things (GIoT) generally refers to a new generation of Internet of things
design concept. It can save energy and reduce emissions, reduce environmental pollution …

An industrial network intrusion detection algorithm based on multifeature data clustering optimization model

W Liang, KC Li, J Long, X Kui… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Industrial networks are complex and diverse. Among existing intrusion prevention systems
available, several of them have problems such as low detection accuracy rate, high false …

Detecting crypto-ransomware in IoT networks based on energy consumption footprint

A Azmoodeh, A Dehghantanha, M Conti… - Journal of Ambient …, 2018 - Springer
Abstract An Internet of Things (IoT) architecture generally consists of a wide range of Internet-
connected devices or things such as Android devices, and devices that have more …