A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs

HJ Hadi, Y Cao, KU Nisa, AM Jamil, Q Ni - Journal of Network and …, 2023 - Elsevier
In the past two decades, there has been a rapid development in the drone industry known as
Unmanned Aerial Vehicles (UAVs). Currently, the use of commercial UAVs has increased a …

Security and privacy issues in smart cities/industries: technologies, applications, and challenges

PM Rao, BD Deebak - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …

A survey on security and privacy issues of UAVs

Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti… - Computer Networks, 2023 - Elsevier
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …

A comprehensive review of the state-of-the-art on security and privacy issues in healthcare

A López Martínez, M Gil Pérez… - ACM Computing …, 2023 - dl.acm.org
Currently, healthcare is critical environment in our society, which attracts attention to
malicious activities and has caused an important number of damaging attacks. In parallel …

Survey of Machine Learning based intrusion detection methods for Internet of Medical Things

A Si-Ahmed, MA Al-Garadi, N Boustia - Applied Soft Computing, 2023 - Elsevier
Abstract The Internet of Medical Things (IoMT) has revolutionized the healthcare industry by
enabling physiological data collection using sensors, which are transmitted to remote …

A secure ensemble learning-based fog-cloud approach for cyberattack detection in IoMT

F Khan, MA Jan, R Alturki, MD Alshehri… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) effectively tackles several shortcomings of
conventional healthcare systems. It includes medical personnel shortages, patient care …

[HTML][HTML] Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure

H Riggs, S Tufail, I Parvez, M Tariq, MA Khan, A Amir… - Sensors, 2023 - mdpi.com
Several critical infrastructures are integrating information technology into their operations,
and as a result, the cyber attack surface extends over a broad range of these infrastructures …

A review of multi-factor authentication in the Internet of Healthcare Things

T Suleski, M Ahmed, W Yang, E Wang - Digital health, 2023 - journals.sagepub.com
Objective This review paper aims to evaluate existing solutions in healthcare authentication
and provides an insight into the technologies incorporated in Internet of Healthcare Things …

Data quality detection mechanism against label flipping attacks in federated learning

Y Jiang, W Zhang, Y Chen - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is an emerging framework that enables massive clients (eg, mobile
devices or enterprises) to collaboratively construct a global model without sharing their local …

[HTML][HTML] What prevents us from reusing medical real-world data in research

J Gehrmann, E Herczog, S Decker, O Beyan - Scientific Data, 2023 - nature.com
Medical real-world data stored in clinical systems represents a valuable knowledge source
for medical research, but its usage is still challenged by various technical and cultural …