Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions
E Altulaihan, MA Almaiah, A Aljughaiman - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) interconnects physical and virtual objects embedded with
sensors, software, and other technologies, which exchange data using the Internet. This …
sensors, software, and other technologies, which exchange data using the Internet. This …
A survey of machine and deep learning methods for privacy protection in the internet of things
Recent advances in hardware and information technology have accelerated the proliferation
of smart and interconnected devices facilitating the rapid development of the Internet of …
of smart and interconnected devices facilitating the rapid development of the Internet of …
A privacy-aware framework for detecting cyber attacks on internet of medical things systems using data fusion and quantum deep learning
M Al-Hawawreh, MS Hossain - Information Fusion, 2023 - Elsevier
Abstract Internet of Medical Things (IoMT) devices and systems are often designed without
adequate security, leaving them highly susceptible to cyber threats. Unlike other IoT …
adequate security, leaving them highly susceptible to cyber threats. Unlike other IoT …
An intelligent intrusion detection system for smart consumer electronics network
The technological advancements of Internet of Things (IoT) has revolutionized traditional
Consumer Electronics (CE) into next-generation CE with higher connectivity and …
Consumer Electronics (CE) into next-generation CE with higher connectivity and …
[HTML][HTML] Securing healthcare data in industrial cyber-physical systems using combining deep learning and blockchain technology
Industrial cyber–physical systems (ICPS) are emerging platforms for various industrial
applications. For instance, remote healthcare monitoring, real-time healthcare data …
applications. For instance, remote healthcare monitoring, real-time healthcare data …
A new blockchain-based authentication framework for secure IoT networks
Most current research on decentralized IoT applications focuses on a specific vulnerability.
However, for IoT applications, only a limited number of techniques are dedicated to handling …
However, for IoT applications, only a limited number of techniques are dedicated to handling …
A review of multi-factor authentication in the Internet of Healthcare Things
Objective This review paper aims to evaluate existing solutions in healthcare authentication
and provides an insight into the technologies incorporated in Internet of Healthcare Things …
and provides an insight into the technologies incorporated in Internet of Healthcare Things …
Cybersecurity Risk Analysis in the IoT: A Systematic Review
TS AlSalem, MA Almaiah, A Lutfi - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising
significant concerns about future cybersecurity risks and the need for reliable solutions. This …
significant concerns about future cybersecurity risks and the need for reliable solutions. This …
Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review
S Messinis, N Temenos, NE Protonotarios… - Computers in Biology …, 2024 - Elsevier
Over the past five years, interest in the literature regarding the security of the Internet of
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …
[PDF][PDF] Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment
AM Albalawi, MA Almaiah - J. Theor. Appl. Inf. Technol, 2022 - researchgate.net
ABSTRACT Despite Internet of Things (IoT) technology has a great potential to connect
devices and sensors through communication media, such as Wi-Fi, to the internet and …
devices and sensors through communication media, such as Wi-Fi, to the internet and …