Recent review of distributed denial of service attacks in the internet of things

H Djuitcheu, M Debes, M Aumüller… - 2022 5th conference on …, 2022 - ieeexplore.ieee.org
The use of the Internet of Things (IoT) in almost all domains nowadays makes it the network
of the future. Due to the high attention since its creation, this network is the target of …

[PDF][PDF] Implementing IOT in effective project management

M El Khatib, RA Zitar, A Alnaqbi, A Alnaqbi… - … for Computers & …, 2023 - researchgate.net
Abstract The Internet of Things (IoT) can revolutionize project management by allowing
devices to communicate and share data, automate tasks, and improve communication and …

Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things

YM Tukur, D Thakker, IU Awan - Transactions on Emerging …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) platforms are responsible for overall data processing in the
IoT System. This ranges from analytics and big data processing to gathering all sensor data …

Clustering-based data integrity verification approach for multi-replica in a fog environment

KU Maheswari, SMS Bhanu, N Savarimuthu - The Journal of …, 2024 - Springer
Due to dynamic changes, applications designed for the Internet of Things (IoT) require new
storage resources. Storing IoT data in a fog infrastructure is a common practice to guarantee …

A formal framework for secure fog architectures: Application to guarantee reliability and availability

Z Benzadri, A Bouheroum, F Belala - International Journal of …, 2021 - igi-global.com
Despite the importance of fog computing, few works using formal techniques have been
interested in the modelling and verification of fog architectures to ensure their security. The …

The Case for Validating ADDIE Model as a Digital Forensic Model for Peer-to-Peer Network Investigation

AS Musa, IU Awan, F Zahrah - Information Systems Frontiers, 2022 - Springer
Rapid technological advancement can substantially impact the processes of digital forensic
investigation and present a myriad of challenges to the investigator. With these challenges, it …

Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation

AS Musa, IU Awan, I Abobaker - 2021 8th International …, 2021 - ieeexplore.ieee.org
While the need for content distribution proliferates-becoming more mammoth and complex
on the Internet-the P2P network perseveres as one of the best avenues to service the …

A Multi-layer Security Scheme (MLSS) for Digital Images Contents

FAF Alyaqobi, NA Yahaya - Turkish Journal of Computer and …, 2023 - turcomat.org
Digital images and their contents are increasingly being utilized in numerous applications,
especially in the context of the Internet of Things (IoT). The rapid growth of IoT has facilitated …

IoT in healthcare sector-a comprehensive analysis of threats and privacy issues

J Chaudhary, S Prasad - AIP Conference Proceedings, 2022 - pubs.aip.org
The Internet of Things (IoT) enabled devices to have made communication seamless.
However, at the same time, with this ease, the need for security has also increased. This …

Factors that Impact Information Technology Security Professionals' Intent to Use Intrusion Detection Systems: A Correlational Study

M Paiola - 2021 - search.proquest.com
The present study examined the extent to which performance expectancy, effort expectancy,
social influence, and facilitating conditions correlate to information technology security …