Machine learning in IoT security: Current solutions and future challenges

F Hussain, R Hussain, SA Hassan… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The future Internet of Things (IoT) will have a deep economical, commercial and social
impact on our lives. The participating nodes in IoT networks are usually resource …

Security analysis of IoT devices by using mobile computing: a systematic literature review

B Liao, Y Ali, S Nazir, L He, HU Khan - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) devices are operating in various domains like healthcare
environment, smart cities, smart homes, transportation, and smart grid system. These …

Machine learning approaches for sustainable cities using internet of things

TM Ghazal, MK Hasan, M Ahmad, HM Alzoubi… - The Effect of Information …, 2023 - Springer
As these tech-based cities continue to emerge, so do the experts dive deeper into the
research on the various Internet of Things methods, and the most plausible machine …

Cyber threat predictive analytics for improving cyber supply chain security

A Yeboah-Ofori, S Islam, SW Lee… - IEEE …, 2021 - ieeexplore.ieee.org
Cyber Supply Chain (CSC) system is complex which involves different sub-systems
performing various tasks. Security in supply chain is challenging due to the inherent …

Appraisal of stakeholders' willingness to adopt construction 4.0 technologies for construction projects

TO Osunsanmi, CO Aigbavboa… - … Project and Asset …, 2020 - emerald.com
Purpose Construction 4.0 technology has the capabilities for improving the design,
management, operations and decision making of construction projects. Therefore, this study …

[HTML][HTML] Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review

A Iftikhar, KN Qureshi, M Shiraz, S Albahli - Journal of King Saud University …, 2023 - Elsevier
High-speed networks are utilized to satisfy user demands by using cloud and edge services.
Due to the heterogeneous nature of these networks, security, trust, and privacy are the …

Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities

M Yahuza, MYIB Idris, AWBA Wahab, ATS Ho… - IEEE …, 2020 - ieeexplore.ieee.org
Edge computing is a promising paradigm that enhances the capabilities of cloud computing.
In order to continue patronizing the computing services, it is essential to conserve a good …

An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks

S Rezvy, Y Luo, M Petridis, A Lasebae… - 2019 53rd Annual …, 2019 - ieeexplore.ieee.org
A Network Intrusion Detection System is a critical component of every internet-connected
system due to likely attacks from both external and internal sources. Such Security systems …

A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories

U Noor, Z Anwar, AW Malik, S Khan… - Future Generation …, 2019 - Elsevier
With the ever increasing cases of cyber data breaches, the manual process of sifting through
tons of security logs to investigate cyber-attacks is error-prone and time-consuming …

The benefits of edge computing in healthcare, smart cities, and IoT

R Dave, N Seliya, N Siddiqui - arXiv preprint arXiv:2112.01250, 2021 - arxiv.org
Recent advancements in technology now allow for the generation of massive quantities of
data. There is a growing need to transmit this data faster and more securely such that it …