As the number of users getting acquainted with the Internet is escalating rapidly, there is more user-generated content on the web. Comprehending hidden opinions, sentiments, and …
The accelerated move toward the adoption of the Industrial Internet-of-Things (IIoT) paradigm has resulted in numerous shortcomings as far as security is concerned. One of the …
A Alharbi, W Alosaimi, H Alyami, HT Rauf… - Electronics, 2021 - mdpi.com
The need for timely identification of Distributed Denial-of-Service (DDoS) attacks in the Internet of Things (IoT) has become critical in minimizing security risks as the number of IoT …
S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G Internet need services offered by cloud computing for processing and storing more …
Energy is critical infrastructure, and addressing cybersecurity issues in the energy sector is challenging. Cloud computing has advanced from being a data storage solution to a …
V Puri, A Kataria, V Sharma - Transactions on Emerging …, 2024 - Wiley Online Library
Remote patient monitoring and data management have gained much popularity in recent years because of their enhanced access to low‐cost healthcare services. A cloud‐based …
MN Alam, D Sarma, FF Lima, I Saha… - … conference on smart …, 2020 - ieeexplore.ieee.org
Evolving digital transformation has exacerbated cybersecurity threats globally. Digitization expands the doors wider to cybercriminals. Initially cyberthreats approach in the form of …
M Shurman, R Khrais, A Yateem - Int. Arab J. Inf. Technol, 2020 - researchgate.net
In the recent years, Denial-of-Dervice (DoS) orDistributed Denial-of-Service (DDoS) attack has spread greatly and attackers make online systems unavailable to legitimate users by …
TA Tuan, HV Long, D Taniar - Computers & Security, 2022 - Elsevier
Botnets are a frequent threat to information systems on the Internet, capable of launching denial-of-service attacks, spreading spam and malware on a large scale. Detecting and …