With the continuous expansion and evolution of IoT applications, attacks on those IoT applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …
Virtually any software running on a computer has been processed by a compiler or a compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product (GDP) and as a source of …
Cybersecurity has been widely used in various applications, such as intelligent industrial systems, homes, personal devices, and cars, and has led to innovative developments that …
Nowadays, hackers take illegal advantage of distributed resources in a network of computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …
RF Hayat, S Aurangzeb, M Aleem… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks as well as botnet-based attacks are among the most important security vulnerabilities in Internet of Things (IoT) environments. Most of the …
How to stay in charge in a world populated by algorithms that beat us in chess, find us romantic partners, and tell us to “turn right in 500 yards.” Doomsday prophets of technology …
The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and …
NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice- based assistants, smart lighting, and security cameras have widely adopted the Internet of …