Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics, such as scalability and flexibility. However, despite these advantages, security concerns …
R Kumar, R Tripathi - Transactions on Emerging …, 2021 - Wiley Online Library
By providing ubiquitous connectivity, effective data analytics tools, and better decision support systems for improved market competitiveness, the industrial internet of things (IIoT) …
A distributed power system operation and control node privacy and security are attractive research questions that deliver electrical energy systems to the participating stakeholders …
With the growth of the Internet of Things (IoT), security attacks are also rising gradually. Numerous centralized mechanisms have been introduced in the recent past for the detection …
Abstract Internet of Things (IoT) devices in Smart Home Network (SHN) are highly vulnerable to complex botnet attacks. In this paper, we investigate the effectiveness of …
Network intrusion detection methods based on federated learning (FL) and edge computing have great potential for protecting the cybersecurity of the Internet of Things. It overcomes …
H Canli, S Toklu - IEEE Access, 2021 - ieeexplore.ieee.org
In the era of Internet of Things (IoT) and smart city ecosystems, there is a need for innovative smart parking systems for more sustainable cities. With the increasing number of vehicles in …
S Ali, O Abusabha, F Ali, M Imran… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Despite the benefits of the Internet of Things (IoT), the growing influx of IoT-specific malware coordinating large-scale cyberattacks via infected IoT devices has created a substantial …
F Wang, N Yang, PM Shakeel… - Transactions on …, 2024 - Wiley Online Library
In the recent past, different types of Mobile Network payments gateways have been explosively growing, which allows consumers to access services using various types of …