SS Sefati, S Halunga - Transactions on Emerging …, 2023 - Wiley Online Library
A new technology known as the Internet of Things (IoT) uses several sensor devices and communication protocols. By implementing cutting‐edge and modern equipment, people …
A Koohang, CS Sargent, JH Nord… - International Journal of …, 2022 - Elsevier
This paper proposes a research model with five constructs, ie, IoT awareness, users' IoT privacy knowledge, users' IoT security knowledge, users' IoT Trust, and continued intention …
LY Rock, FP Tajudeen, YW Chung - Universal access in the information …, 2024 - Springer
The aim of this paper is to explore the usage and impact of the Internet-of-Things-based Smart Home Technology (IoT-SHT) in Malaysia. Face-to-face interviews were conducted …
WI Khedr, AE Gouda, ER Mohamed - IEEE Access, 2023 - ieeexplore.ieee.org
The absence of standards and the diverse nature of the Internet of Things (IoT) have made security and privacy concerns more acute. Attacks such as distributed denial of service …
Phishing attacks are evolving with more sophisticated techniques, posing significant threats. Considering the potential of machine-learning-based approaches, our research presents a …
A Aliahmadi, H Nozari - Supply Chain Forum: An International …, 2023 - Taylor & Francis
Today, smart supply chains are one of the main and growing applications of evolving technologies such as the Internet of Things (IoT), artificial intelligence (AI), and blockchain …
This paper provides a comprehensive review of solutions based on artificial intelligence (AI) in the urban energy sector, with a focus on their applications and impacts. The study …
Abstract The Internet of Things (IoT) technologies continuously expand with time due to the advances in automated, connected device technology, mobility, and wide access to …
M Mehmood, R Amin, MMA Muslam, J Xie… - IEEE …, 2023 - ieeexplore.ieee.org
Because of the recent exponential rise in attack frequency and sophistication, the proliferation of smart things has created significant cybersecurity challenges. Even though …