AI-powered biometrics for Internet of Things security: A review and future vision
Biometrics is a set of advanced technologies that use the physical or behavioral
characteristics of individuals to provide reliable access control. With the rapid development …
characteristics of individuals to provide reliable access control. With the rapid development …
[Retracted] An AI‐Driven Hybrid Framework for Intrusion Detection in IoT‐Enabled E‐Health
F Wahab, Y Zhao, D Javeed… - Computational …, 2022 - Wiley Online Library
E‐health has grown into a billion‐dollar industry in the last decade. Its device's high
throughput makes it an obvious target for cyberattacks, and these environments desperately …
throughput makes it an obvious target for cyberattacks, and these environments desperately …
IoT-based biometric recognition systems in education for identity verification services: Quality assessment approach
M Rukhiran, S Wong-In, P Netinant - Ieee Access, 2023 - ieeexplore.ieee.org
Traditional identity verification of students based on the human proctoring approach can
cause a scam identity verification and ineffective processing time, particularly among vast …
cause a scam identity verification and ineffective processing time, particularly among vast …
Application layer security for Internet communications: A comprehensive review, challenges, and future trends
D Cevallos-Salas, J Estrada-Jiménez… - Computers and Electrical …, 2024 - Elsevier
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
Patients medical record monitoring using IoT based biometrics blockchain security system
The Patient medical record monitoring using IoT based Biometrics and blockchain security
system suggests an innovative strategy for patient monitoring of their health and disease that …
system suggests an innovative strategy for patient monitoring of their health and disease that …
[PDF][PDF] Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis
This research introduces an algorithmic framework for enhancing the security of Internet of
Things (IoT) networks. The Enhanced Anomaly Detection (EAD) algorithm initiates the …
Things (IoT) networks. The Enhanced Anomaly Detection (EAD) algorithm initiates the …
[PDF][PDF] Hybrid software defined network-based deep learning framework for enhancing internet of medical things cybersecurity
The rapid growth of the internet of medical things (IoMT) has escalated cyberattack risks in
healthcare. With IoMT devices proliferating in healthcare facilities, conventional intrusion …
healthcare. With IoMT devices proliferating in healthcare facilities, conventional intrusion …
Deep Learning for Enhanced IoMT Security: A GNN-BiLSTM Intrusion Detection System
The growing number of Internet of Medical Things (IoMT) devices integrated into healthcare
creates an expanding attack surface. Traditional intrusion detection methods struggle to …
creates an expanding attack surface. Traditional intrusion detection methods struggle to …
An Intrusion Detection System for the Internet of Medical Things (IoMT): An Artificial Intelligence (AI) Approach
E Araba, P Moggridge - ATBU Journal of Science, Technology …, 2024 - atbuftejoste.com.ng
Abstract The Internet of Medical Things (IoMT) is a network of linked medical devices,
including pacemakers, prosthetic limbs, glucometers, smartwatches, and more, integrated …
including pacemakers, prosthetic limbs, glucometers, smartwatches, and more, integrated …
[PDF][PDF] Research Article An AI-Driven Hybrid Framework for Intrusion Detection in IoT-Enabled E-Health
F Wahab, Y Zhao, D Javeed, MH Al-Adhaileh… - 2022 - academia.edu
E-health has grown into a billion-dollar industry in the last decade. Its device's high
throughput makes it an obvious target for cyberattacks, and these environments desperately …
throughput makes it an obvious target for cyberattacks, and these environments desperately …