Utilizing blockchain to overcome cyber security concerns in the internet of things: A review

B Alotaibi - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
… In this article, the blockchain attempts to overcome IoT limitations that are related to cyber
security have been classified into four categories: end-to-end traceability; data privacy and …

Blockchain-aided integrated edge framework of cybersecurity for Internet of Things

A Hazra, A Alkhayyat, M Adhikari - IEEE Consumer Electronics …, 2022 - ieeexplore.ieee.org
… can train the whole network with higher cybersecurity using a global aggregator and …
cybersecurity in the overall networks. To guarantee the overall network cybersecurity, and attack

Regulating the internet of things: discrimination, privacy, and cybersecurity in the artificial intelligence age

CA Tschider - Denv. L. Rev., 2018 - HeinOnline
cybersecurity regulatory approach for consumer loT. Part II describes discrimination, privacy,
and cybersecurity … In Part III, this Article explores existing ex ante cybersecurity and privacy …

[PDF][PDF] New generations of internet of things datasets for cybersecurity applications based machine learning: TON_IoT datasets

N Moustafa - Proceedings of the eResearch …, 2019 - conference.eresearch.edu.au
… the Internet of Things (IoT) and Industrial IoT (IIoT) are essential for training and validating
the fidelity of cybersecurity … their capability for evaluating cybersecurity applications such as …

The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks

M Shafiq, Z Gu, O Cheikhrouhou… - Wireless …, 2022 - Wiley Online Library
… detection and prevention of IoT-based security attacks. The rise of the “Internet of Things
(IoT) is driving a new wave of cyber security attacks on IoT devices. The number of connected …

[HTML][HTML] A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things

AM Alnajim, S Habib, M Islam, SM Thwin, F Alotaibi - Technologies, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) ecosystem faces increased risks and vulnerabilities
due to adopting Industry 4.0 standards. Integrating data from various places and converging …

[PDF][PDF] A reliable next generation cyber security architecture for industrial internet of things environment

C Vijayakumaran, B Muthusenthil… - International Journal of …, 2020 - core.ac.uk
… This section discusses different kinds of security attacks and major cybersecurity
cybersecurity-related attacks. The proposed system provides a reliable, automated, cybersecurity

Detecting Internet of Things attacks using distributed deep learning

GDLT Parra, P Rad, KKR Choo, N Beebe - Journal of Network and …, 2020 - Elsevier
… phishing and Botnet attack detection and … attacks; and (2) a cloud-based temporal Long-Short
Term Memory (LSTM) network model hosted on the back-end for detecting Botnet attacks, …

[图书][B] Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks

K Boeckl, K Boeckl, M Fagan, W Fisher, N Lefkovitz… - 2019 - a51.nl
… manage the cybersecurity and privacy risks associated with individual Internet of Things (IoT) …
identified risk through the lens of cybersecurity and privacy. However, this does not mean …

[HTML][HTML] An ontology-based cybersecurity framework for the internet of things

BA Mozzaquatro, C Agostinho, D Goncalves, J Martins… - Sensors, 2018 - mdpi.com
Internet of Things (IoT). However, the connectivity of many stand-alone IoT systems through
the Internet introduces numerous cybersecurity … the improvement of IoT cybersecurity from an …