Internet of Things and healthcare system: A systematic review of ethical issues

S Zakerabasali, SM Ayyoubzadeh - Health Science Reports, 2022 - Wiley Online Library
Abstract Background and Aims The Internet of Things (IoTs) is a set of connected objects
and devices that share data and pursue a common goal in different areas. IoT technology …

Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future

SF Ahmed, S Shuravi, A Bhuyian, S Afrin… - arXiv preprint arXiv …, 2023 - arxiv.org
Given the exponential expansion of the internet, the possibilities of security attacks and
cybercrimes have increased accordingly. However, poorly implemented security …

[HTML][HTML] An optimization model for appraising intrusion-detection systems for network security communications: Applications, challenges, and solutions

M Abdel-Basset, A Gamal, KM Sallam, I Elgendi… - Sensors, 2022 - mdpi.com
Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of
intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The …

[HTML][HTML] Detection of Hello Flood Attacks Using Fuzzy-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks

S Radhika, K Anitha, C Kavitha, WC Lai, SR Srividhya - Electronics, 2022 - mdpi.com
Clustering is one among the most important strategies to improve the lifetime of wireless
sensor networks (WSNs). The frequent occurrence of clustering and the subsequent …

Intrusion detection in internet of things using convolutional neural networks

M Kodyš, Z Lu, KW Fok… - 2021 18th International …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) has become a popular paradigm to fulfil needs of the industry such
as asset tracking, resource monitoring and automation. As security mechanisms are often …

EIDDM: Edge and internet layer distributed dos threats detection and mitigation for internet of things wireless communications

K Kumavat, J Gomes - Wireless Personal Communications, 2023 - Springer
Abstract Distributed Denial of Service (DDoS) attacks, plague the Internet of Things (IoT)-
enabled distributed communication network. To mitigate DDoS attacks on IoT many …

IoT-Paradigm: Evolution Challenges and Proposed Solutions

M Al Rawajbeh, S AlZu'bi… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The tremendous increase of using intelligent devices brought by the Internet of Things
technology was a success to change the shape and nature of provided services in the digital …

[HTML][HTML] A novel software architecture solution with a focus on long-term IoT device security support

I Dodig, D Cafuta, T Kramberger, I Cesar - Applied Sciences, 2021 - mdpi.com
This paper presents a solution for upgrading a previous device model to an Industry 4.0
smart device, with the goal of maintaining high compatibility. A novel IoT architecture is …

Supporting and shaping human decisions through internet of behaviors (iob): Perspectives and implications

R Damaševičius, R Maskeliūnas, S Misra - Machine Intelligence for Smart …, 2023 - Springer
The rise of the Internet of Behaviors (IoB) has paved the way for new opportunities to support
and shape human decision-making. IoB refers to the collection, analysis, and use of digital …

Home Automation and RFID‐Based Internet of Things Security: Challenges and Issues

H Fatima, HU Khan, S Akbar - Security and Communication …, 2021 - Wiley Online Library
Internet of Things (IoT) protection refers to the software field related to securing the Internet
of Things and associated linked devices and systems. The IoT is a system of interconnected …