Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

A survey of wearable devices and challenges

S Seneviratne, Y Hu, T Nguyen, G Lan… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
As smartphone penetration saturates, we are witnessing a new trend in personal mobile
devices-wearable mobile devices or simply wearables as it is often called. Wearables come …

Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey

A Barua, MA Al Alamin, MS Hossain… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …

Deepsense: A unified deep learning framework for time-series mobile sensing data processing

S Yao, S Hu, Y Zhao, A Zhang… - Proceedings of the 26th …, 2017 - dl.acm.org
Mobile sensing and computing applications usually require time-series inputs from sensors,
such as accelerometers, gyroscopes, and magnetometers. Some applications, such as …

The role of data science in healthcare advancements: applications, benefits, and future prospects

SVG Subrahmanya, DK Shetty, V Patil… - Irish Journal of Medical …, 2022 - Springer
Data science is an interdisciplinary field that extracts knowledge and insights from many
structural and unstructured data, using scientific methods, data mining techniques, machine …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review

T Yaqoob, H Abbas… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Over the last few years, healthcare administrations have been digitizing their provision of
care that led to an increased number of networked medical devices and medical telemetry …

A systematic review on healthcare analytics: application and theoretical perspective of data mining

MS Islam, MM Hasan, X Wang, HD Germack… - Healthcare, 2018 - mdpi.com
The growing healthcare industry is generating a large volume of useful data on patient
demographics, treatment plans, payment, and insurance coverage—attracting the attention …

An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing

J Yu, L Lu, Y Chen, Y Zhu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper demonstrates the feasibility of a side-channel attack to infer keystrokes on touch
screen leveraging an off-the-shelf smartphone. Although there exist some studies on …