Internet of things (IoT) security dataset evolution: Challenges and future directions
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …
Autonomous driving security: State of the art and challenges
The autonomous driving industry has mushroomed over the past decade. Although
autonomous driving has undoubtedly become one of the most promising technologies of this …
autonomous driving has undoubtedly become one of the most promising technologies of this …
Analysis of factors affecting IoT-based smart hospital design
Currently, rapidly developing digital technological innovations affect and change the
integrated information management processes of all sectors. The high efficiency of these …
integrated information management processes of all sectors. The high efficiency of these …
Machine-learning-assisted security and privacy provisioning for edge computing: A survey
S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …
millions of sensors and provide services at the device end. The broad vision of EC integrates …
[HTML][HTML] IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks
Abstract The Internet of Things (IoT) devices have been integrated into almost all everyday
applications of human life such as healthcare, transportation and agriculture. This …
applications of human life such as healthcare, transportation and agriculture. This …
Review of Industry 4.0 from the perspective of automation and supervision systems: Definitions, architectures and recent trends
Industry 4.0 is a new paradigm that is transforming the industrial scenario. It has generated a
large amount of scientific studies, commercial equipment and, above all, high expectations …
large amount of scientific studies, commercial equipment and, above all, high expectations …
[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …
operated through the Internet, enable the transfer of data among objects or people …
[HTML][HTML] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT
SU Qureshi, J He, S Tunio, N Zhu, A Nazir… - Journal of King Saud …, 2024 - Elsevier
The swift proliferation of Internet of Things (IoT) devices has presented considerable
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …
[Retracted] An Improved Deep Belief Network IDS on IoT‐Based Network for Traffic Systems
Internet of things (IoT) services are turning out to be more domineering with the rising
security considerations fading with time. All this owes to the propagating heterogeneity and …
security considerations fading with time. All this owes to the propagating heterogeneity and …
Attacks against cross-chain systems and defense approaches: A contemporary survey
L Duan, Y Sun, W Ni, W Ding, J Liu… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
The blockchain cross-chain is a significant technology for inter-chain interconnection and
value transfer among different blockchain networks. Cross-chain overcomes the “information …
value transfer among different blockchain networks. Cross-chain overcomes the “information …