Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review

S Messinis, N Temenos, NE Protonotarios… - Computers in Biology …, 2024 - Elsevier
Over the past five years, interest in the literature regarding the security of the Internet of
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …

[HTML][HTML] Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles

G Ali, MM Mijwil - Mesopotamian Journal of …, 2024 - journals.mesopotamian.press
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in
transformative advances and promising enhanced patient care, operational efficiency, and …

[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges

T Sasi, AH Lashkari, R Lu, P Xiong, S Iqbal - Journal of Information and …, 2023 - Elsevier
Abstract The Internet of Things (IoT) has set the way for the continuing digitalization of
society in various manners during the past decade. The IoT is a vast network of intelligent …

SSHAA: A Python Package Index for visualizing features of SSH attacks with text mining in classification

Y Nakamura, T Fukuda, X Yang… - … Security Journal: A …, 2024 - Taylor & Francis
With the proliferation of the Internet, the number of cyber-attacks has increased worldwide.
To prevent cyber-attacks, network administrators need to use analytical tools to disclose six …

algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms

N Kshetri, D Kumar, J Hutson, N Kaur… - … Symposium on Digital …, 2024 - ieeexplore.ieee.org
The global rise in online users and devices has led to a corresponding surge in cybercrimes
and attacks, demanding advanced technology and algorithms like Artificial Intelligence (AI) …

Privacy Management and Interface Design for a Smart House

AM Comeaga, I Marin - arXiv preprint arXiv:2402.18973, 2024 - arxiv.org
In today's life, more and more people tend to opt for a smart house. In this way, the idea of
including technology has become popular worldwide. Despite this concept's many benefits …

Application Layer Security For Cloud

R Patel, A Goswami, HK Mistry, C Mavani - … Administration: Theory and …, 2024 - kuey.net
The rapid emergence and evolution of cloud computing have revolutionized the way
organizations and individuals manage their data. However, this new technology also comes …

Firmware Development and Certification for IoT Devices

GM Bianco - 2024 - webthesis.biblio.polito.it
The Internet of Things (IoT) presents itself as an innovative technology that facilitates the
interconnection of devices and physical systems via the Internet, allowing the exchange of …

Machine Learning-Based Detection and Mitigation of XML SQL Injection Attacks

V Pahuja, R Dubey, I Sharma - 2023 Global Conference on …, 2023 - ieeexplore.ieee.org
XML and SQL injection attacks are occurring very frequently nowadays as developers lack
major security measures and awareness for the purpose of securing web applications and …

Blockchain: A secure solution for identifying counterfeits and improving supply chain reliability

M Farhan, RB Sulaiman, AH Nur - … International Conference on …, 2024 - ieeexplore.ieee.org
Counterfeit goods provide a substantial risk to both consumers and corporations. This study
presents a system that employs blockchain technology to address the issue of counterfeiting …