Security and privacy for 6G: A survey on prospective technologies and challenges

VL Nguyen, PC Lin, BC Cheng… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …

Internet of Things intrusion detection systems: a comprehensive review and future directions

A Heidari, MA Jabraeil Jamali - Cluster Computing, 2023 - Springer
Abstract The Internet of Things (IoT) is a paradigm that connects objects to the Internet as a
whole and enables them to work together to achieve common objectives, such as innovative …

A survey on security challenges in cloud computing: issues, threats, and solutions

H Tabrizchi, M Kuchaki Rafsanjani - The journal of supercomputing, 2020 - Springer
Cloud computing has gained huge attention over the past decades because of continuously
increasing demands. There are several advantages to organizations moving toward cloud …

Constructing dummy query sequences to protect location privacy and query privacy in location-based services

Z Wu, G Li, S Shen, X Lian, E Chen, G Xu - World Wide Web, 2021 - Springer
Location-based services (LBS) have become an important part of people's daily life.
However, while providing great convenience for mobile users, LBS result in a serious …

Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges

R Roman, J Lopez, M Mambo - Future Generation Computer Systems, 2018 - Elsevier
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …

Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning

A Azmoodeh, A Dehghantanha… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-
connected devices and nodes (eg, medical devices and wearable combat uniforms). These …

[PDF][PDF] Investigating the use of an artificial intelligence model in an ERP cloud-based system

N Yathiraju - International Journal of Electrical, Electronics and …, 2022 - aipublications.com
Enterprise Resource Planning (ERP) systems are necessary to improve an enterprise's
management performance. However, the perception of information technology (IT) …

A comprehensive survey on security challenges in different network layers in cloud computing

M Jangjou, MK Sohrabi - Archives of Computational Methods in …, 2022 - Springer
Conducting enterprise distributed computing and providing facilities such as data storage
and resource sharing, along with the provision of cheap, easy, and flexible services, have …

A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks

HH Pajouh, R Javidan, R Khayami… - … on Emerging Topics …, 2016 - ieeexplore.ieee.org
With increasing reliance on Internet of Things (IoT) devices and services, the capability to
detect intrusions and malicious activities within IoT networks is critical for resilience of the …

Blockchain-based IoT devices in supply chain management: a systematic literature review

M Hussain, W Javed, O Hakeem, A Yousafzai… - Sustainability, 2021 - mdpi.com
Through recent progress, the forms of modern supply chains have evolved into complex
networks. The supply chain management systems face a variety of challenges. These …