Security in the internet of things application layer: requirements, threats, and solutions

M Abbasi, M Plaza-Hernández, J Prieto… - IEEE …, 2022 - ieeexplore.ieee.org
Communication systems and networks are evolving as an integral part of not only of our
everyday life but also as a part of the industry, fundamental infrastructures, companies, etc …

AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms

MT Ahvanooey, MX Zhu, S Ou, HD Mazraeh… - Computers & …, 2023 - Elsevier
Abstract Social Media Platforms (SMPs) have changed how we communicate, share, and
obtain information. However, this also comes at a cost, as users (willingly) share their …

A Fuzzy-Based Analysis of the Mediating Factors Affecting Sustainable Purchase Intentions of Smartphones: The Case of Two Brands in Two Asian Countries

M Moslehpour, SEP Faez, BB Gupta, V Arya - Sustainability, 2023 - mdpi.com
Given their functionality, all smartphone brands are the same. Their similarities
notwithstanding, they supply the same product at different prices in the same market …

From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices

Y Xiao, Y He, X Zhang, Q Wang, R Xie, K Sun… - arXiv preprint arXiv …, 2024 - arxiv.org
The proliferation of consumer IoT products in our daily lives has raised the need for secure
device authentication and access control. Unfortunately, these resource-constrained devices …

The Internet of Things: Security Challenges and Opportunities

P Baniya, A Agrawal, K Abid, J Nath… - … on Power Electronics …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) rapidly integrates physical objects with the internet, enabling
data sharing, but its swift expansion poses substantial security challenges. These include a …

A Survey on Fingerprinting Technologies for Smartphones Based on Embedded Transducers

A Berdich, B Groza, R Mayrhofer - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Smartphones are a vital technology, they improve our social interactions, provide us a great
deal of information, and bring forth the means to control various emerging technologies, like …

AFPr-AM:: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms

M Taleby Ahvanooey, MX Zhu, S Ou, H Dana Mazraeh… - 2023 - dl.acm.org
Abstract Social Media Platforms (SMPs) have changed how we communicate, share, and
obtain information. However, this also comes at a cost, as users (willingly) share their …

Multimedia application for forensic automatic speaker recognition from disguised voices using MFCC feature extraction and classification techniques

MK Singh - Multimedia Tools and Applications, 2024 - Springer
In forensic automatic speaker recognition (FASR), voice disguise is a most important
disquiet in the field of multimedia applications. It is most important to classify the disguised …

Security aspects of digital twins in IoT platform

V Pavlov - 2022 - essay.utwente.nl
With the number of inter-connected devices, expected to be almost 30 billion by 2030, the
IoT technologies already became a part from everyday life, various areas like public health …

Secure authentication protocols to resist off-line attacks on authentication data table

VR Falmari - Journal of Computer Security, 2024 - content.iospress.com
In text-based authentication, the passwords along with user names are maintained in the
Authentication Data Table (ADT). It is necessary to preserve the privacy of passwords in ADT …