Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives

B Vignau, R Khoury, S Hallé, A Hamou-Lhadj - Journal of Systems …, 2021 - Elsevier
The past decade has seen a rapidly growing interest in IoT-connected devices. But as is
usually the case with computer systems and networks, malicious individuals soon realized …

[HTML][HTML] Penetration testing of connected households

F Heiding, E Süren, J Olegård, R Lagerström - Computers & Security, 2023 - Elsevier
Connected devices have become an integral part of modern homes and household devices,
such as vacuum cleaners and refrigerators, are now often connected to networks. This …

Intrusion detection system for iot botnet attacks using deep learning

J Shareena, A Ramdas, H AP - SN Computer Science, 2021 - Springer
The IoT industry is seen intensifying its presence along these recent years. Since IoT
devices are small and heterogeneous they can easily fall prey to the cyberattacks. Handling …

Vision: too little too late? do the risks of femtech already outweigh the benefits?

M Mehrnezhad, L Shipp, T Almeida… - Proceedings of the 2022 …, 2022 - dl.acm.org
Female-oriented technologies (FemTech) promise to enable women to take control of their
bodies and lives, helping them overcome the many existing challenges in medical care and …

Privacy protection based on stream cipher for spatiotemporal data in IoT

T Liu, Y Wang, Y Li, X Tong, L Qi… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In the participatory sensing framework, privacy protection of the Internet of Things (IoT) is
very important. In this article, cryptography-based methods are utilized to protect participants' …

Characterizing everyday misuse of smart home devices

P Moh, P Datta, N Warford, A Bates… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Exploration of Internet of Things (IoT) security often focuses on threats posed by external
and technically-skilled attackers. While it is important to understand these most extreme …

A novel adaptive network intrusion detection system for internet of things

P Aravamudhan - Plos one, 2023 - journals.plos.org
Cyber-attack is one of the most challenging aspects of information technology. After the
emergence of the Internet of Things, which is a vast network of sensors, technology started …

“My sex-related data is more sensitive than my financial data and I want the same level of security and privacy\": User Risk Perceptions and Protective Actions in …

M Mehrnezhad, T Almeida - … of the 2023 European Symposium on …, 2023 - dl.acm.org
The digitalization of the reproductive body has engaged myriads of cutting-edge
technologies in supporting people to know and tackle their intimate health. Generally …

An efficient sound and data steganography based secure authentication system

D Datta, L Garg, K Srinivasan, A Inoue, GT Reddy… - 2021 - um.edu.mt
The prodigious advancements in contemporary technologies have also brought in the
situation of unprecedented cyber-attacks. Further, the pin-based security system is an …