Power consumption analysis, measurement, management, and issues: A state-of-the-art review of smartphone battery and energy usage

PKD Pramanik, N Sinhababu, B Mukherjee… - ieee …, 2019 - ieeexplore.ieee.org
The advancement and popularity of smartphones have made it an essential and all-purpose
device. But lack of advancement in battery technology has held back its optimum potential …

A survey on Classification of Cyber-attacks on IoT and IIoT devices

Y Shah, S Sengupta - 2020 11th IEEE Annual Ubiquitous …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices have gained popularity in recent years. With the increased
usage of IoT devices, users have become more prone to Cyber-attacks. Threats against IoT …

[HTML][HTML] An overview of cyber threats, attacks and countermeasures on the primary domains of smart cities

V Demertzi, S Demertzis, K Demertzis - Applied Sciences, 2023 - mdpi.com
A smart city is where existing facilities and services are enhanced by digital technology to
benefit people and companies. The most critical infrastructures in this city are …

Cybersecurity concerns in smart-phones and applications: A survey

MAS Bubukayr, MA Almaiah - 2021 international conference on …, 2021 - ieeexplore.ieee.org
With the greater number of individuals using smartphones and apps increasing gradually,
and with the easily of use. The users may perform more and more sensitive and critical …

Systematic survey on smart home safety and security systems using the Arduino platform

QI Sarhan - IEEE Access, 2020 - ieeexplore.ieee.org
Smart home safety and security systems have gained much importance over the last few
years owing to their notable impact in reducing and preventing losses in resources and …

[HTML][HTML] Smart home anomaly-based IDS: Architecture proposal and case study

A Lara, V Mayor, R Estepa, A Estepa, JE Díaz-Verdejo - Internet of Things, 2023 - Elsevier
The complexity and diversity of the technologies involved in the Internet of Things (IoT)
challenge the generalization of security solutions based on anomaly detection, which should …

A review: secure internet of thing system for smart houses

M Albany, E Alsahafi, I Alruwili, S Elkhediri - Procedia Computer Science, 2022 - Elsevier
The term smart houses have spread recently, and the smart house is a result of
technological development and modern technologies. Internet of things (IoT) technology is a …

[HTML][HTML] Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art …

AT Ayedh M, AWA Wahab, MYI Idris - Applied Sciences, 2023 - mdpi.com
The number of devices connected within organisational networks through” Bring Your Own
Device”(BYOD) initiatives has steadily increased. BYOD security risks have resulted in …

[HTML][HTML] Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities

A Bhardwaj, S Bharany, AW Abulfaraj… - Egyptian Informatics …, 2024 - Elsevier
Smart home devices have brought in a disruptive, revolutionary Internet-based ecosystem
that enhanced our daily lives but has pushed private data from inside our homes to external …

[HTML][HTML] Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …