A survey on privacy and security of Internet of Things

MM Ogonji, G Okeyo, JM Wafula - Computer Science Review, 2020 - Elsevier
Abstract Internet of Things (IoT) has fundamentally changed the way information technology
and communication environments work, with significant advantages derived from wireless …

[HTML][HTML] A review of security concerns in Internet of Things

E Leloglu - Journal of Computer and Communications, 2017 - scirp.org
The Internet of Things (IoT) represents a technologically optimistic future where objects will
be connected to the internet and make intelligent collaborations with other objects …

A novel architectural framework on IoT ecosystem, security aspects and mechanisms: a comprehensive survey

M Bouzidi, N Gupta, FA Cheikh, A Shalaginov… - IEEE …, 2022 - ieeexplore.ieee.org
For the past few years, the Internet of Things (IoT) technology continues to not only gain
popularity and importance, but also witnesses the true realization of everything being smart …

A survey on sniffing attacks on computer networks

P Anu, S Vimala - … on Intelligent Computing and Control (I2C2), 2017 - ieeexplore.ieee.org
Generally Malicious users make use of different attacks at different levels to steal different
level of data. Some of the sniffing attacks that can be used in different levels of networking …

Malicious nodes detection based on artificial neural network in IoT environments

MA Khatun, N Chowdhury… - 2019 22nd International …, 2019 - ieeexplore.ieee.org
The central promise of the Internet of Things (IoT) is to accelerate the interaction with
surroundings. Appliances such as smartwatches, smart bulbs, thermostats, fitness trackers …

[PDF][PDF] Keamanan Ftp Server Berbasiskan Ids Dan Ips Menggunakan Sistem Operasi Linux Ubuntu

S Khadafi, YD Pratiwi, E Alfianto - Network Engineering Research …, 2021 - academia.edu
Vulnerability komputer serverpada jaringan komputer dapat dimanfaatkan hackeratau
attackermelakukan tindakan yang tidak sah yang bertujuan mengacaukan sistem sebuah …

Is Cyber security enough-A study on big data security Breaches in financial institutions

NT Cyriac, L Sadath - 2019 4th International Conference on …, 2019 - ieeexplore.ieee.org
The evolution of technology has turned out to be both a boon and a bane for the financial
industry-invaders are getting increasingly creative in their attacks. The financial sector …

The imperative role of pervasive data in healthcare

AA Sathio, AM Brohi - Pervasive Healthcare: A Compendium of Critical …, 2022 - Springer
Pervasive computing has to reflex the silent servant to monitor data automatically. This
attracts caring for the patient smartly rather than traditionally. The current edge of smart …

[HTML][HTML] Device authentication for 5G terminals via Radio Frequency fingerprints

P Dong, N Hou, Y Tang, Y Cheng, X Ji - High-Confidence Computing, 2024 - Elsevier
The development of wireless communication network technology has provided people with
diversified and convenient services. However, with the expansion of network scale and the …