Cloud security threats and solutions: A survey

UA Butt, R Amin, M Mehmood, H Aldabbas… - Wireless Personal …, 2023 - Springer
Cloud computing is the on-demand availability of PC framework resources. Especially
information storage and handling power, without direct unique administration by the …

Ultra‐reliability and low‐latency communications on the internet of things based on 5G network: Literature review, classification, and future research view

SS Sefati, S Halunga - Transactions on Emerging …, 2023 - Wiley Online Library
A new technology known as the Internet of Things (IoT) uses several sensor devices and
communication protocols. By implementing cutting‐edge and modern equipment, people …

Internet of Things (IoT): From awareness to continued use

A Koohang, CS Sargent, JH Nord… - International Journal of …, 2022 - Elsevier
This paper proposes a research model with five constructs, ie, IoT awareness, users' IoT
privacy knowledge, users' IoT security knowledge, users' IoT Trust, and continued intention …

Usage and impact of the internet-of-things-based smart home technology: a quality-of-life perspective

LY Rock, FP Tajudeen, YW Chung - Universal access in the information …, 2024 - Springer
The aim of this paper is to explore the usage and impact of the Internet-of-Things-based
Smart Home Technology (IoT-SHT) in Malaysia. Face-to-face interviews were conducted …

FMDADM: A multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks

WI Khedr, AE Gouda, ER Mohamed - IEEE Access, 2023 - ieeexplore.ieee.org
The absence of standards and the diverse nature of the Internet of Things (IoT) have made
security and privacy concerns more acute. Attacks such as distributed denial of service …

A hybrid approach for alluring ads phishing attack detection using machine learning

MW Shaukat, R Amin, MMA Muslam, AH Alshehri, J Xie - Sensors, 2023 - mdpi.com
Phishing attacks are evolving with more sophisticated techniques, posing significant threats.
Considering the potential of machine-learning-based approaches, our research presents a …

Evaluation of security metrics in AIoT and blockchain-based supply chain by Neutrosophic decision-making method

A Aliahmadi, H Nozari - Supply Chain Forum: An International …, 2023 - Taylor & Francis
Today, smart supply chains are one of the main and growing applications of evolving
technologies such as the Internet of Things (IoT), artificial intelligence (AI), and blockchain …

AI-Driven Urban Energy Solutions—From Individuals to Society: A Review

K Stecuła, R Wolniak, WW Grebski - Energies, 2023 - mdpi.com
This paper provides a comprehensive review of solutions based on artificial intelligence (AI)
in the urban energy sector, with a focus on their applications and impacts. The study …

[HTML][HTML] Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices

HU Khan, M Sohail, F Ali, S Nazir, YY Ghadi… - Physical …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technologies continuously expand with time due to the
advances in automated, connected device technology, mobility, and wide access to …

Privilege escalation attack detection and mitigation in cloud using machine learning

M Mehmood, R Amin, MMA Muslam, J Xie… - IEEE …, 2023 - ieeexplore.ieee.org
Because of the recent exponential rise in attack frequency and sophistication, the
proliferation of smart things has created significant cybersecurity challenges. Even though …