6G and Intelligent Healthcare: Taxonomy, technologies, open issues and future research directions

A Ahad, Z Jiangbina, M Tahir, I Shayea, MA Sheikh… - Internet of Things, 2024 - Elsevier
ABSTRACT A decentralized patient-centric paradigm is gradually replacing the traditional
hospital and specialist-focused healthcare model. Communication technologies have made …

[HTML][HTML] Ai-powered blockchain technology in industry 4.0, a review

M Soori, R Dastres, B Arezoo - Journal of Economy and Technology, 2024 - Elsevier
Artificial Intelligence (AI) algorithms can be employed to enhance the security of the
blockchain networks in the era of industry 4.0. Smart contracts, powered by blockchain, can …

Securing the Future: Exploring the Synergy of Business Analytics, Machine Learning, and Blockchain Applications in Retail Cybersecurity

J Mark, B Joe - Journal Environmental Sciences And Technology, 2024 - jest.com.pk
This paper delves into the evolving landscape of retail cybersecurity and investigates the
potential synergy of Business Analytics (BA), Machine Learning (ML), and Blockchain …

Towards Efficient 6G IoT Networks: A Perspective on Resource Optimization Strategies, Challenges, and Future Directions

Z Liwen, F Qamar, M Liaqat, MN Hindia… - IEEE Access, 2024 - ieeexplore.ieee.org
The next generation (6G) wireless communication technology has super advantages in high
transmission rates scenarios. Internet of Things (IoT) has been applied in recent years due …

Balancing data privacy and sharing in IIoT: Introducing the GFL-LFF aggregation algorithm

R Regan, R Josphineleela, M Khamruddin, R Vijay - Computer Networks, 2024 - Elsevier
Abstract As the Industrial Internet of Things (IIoT) continues to evolve, the need for effective
data aggregation schemes that balance the imperatives of data sharing and individual data …

Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

P Su, J Hu - Multimedia Systems, 2024 - Springer
Up to now, the smart contract vulnerabilities detection methods based on sequence modal
data and sequence models have been the most commonly used. However, existing state-of …

IoT Security Model for Smart Cities based on a Metamodeling Approach

DZ Alotaibe - Engineering, Technology & Applied Science Research, 2024 - etasr.com
Security solutions for the Internet of Things (IoT) in smart cities are complex and require a
comprehensive approach to success. Several models and frameworks have been …

Formulating Global Policies and Strategies for Combating Criminal Use and Abuse of Artificial Intelligence

AD Samuel-Okon, OO Olateju… - Archives of …, 2024 - editor.openaccessbook.com
This study investigates the criminal use and abuse of artificial intelligence (AI), exploring the
effectiveness of various mitigation strategies. It employs a mixed-methods approach …

Security Principles in Smart and Agile Cybersecurity for IoT and IIoT Environments

AS Alshraa, L Al Sardy, M Dibaei… - Smart and Agile …, 2024 - igi-global.com
As the integration of the internet of things (IoT) and industrial internet of things (IIoT)
technologies continues to increase across various industries, ensuring strong cybersecurity …

Security and Privacy Measures to Protect Machine Learning in Medical Applications

R Singh, J Joshi, A Goyal, P Rathi… - 2024 International …, 2024 - ieeexplore.ieee.org
Machine learning has become a crucial tool in the field of medicine, aiding in the
development of predictive models, identifying patterns, and making precise diagnoses …