Internet of things (IoT) security dataset evolution: Challenges and future directions

B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P Xiong… - Internet of Things, 2023 - Elsevier
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …

Autonomous driving security: State of the art and challenges

C Gao, G Wang, W Shi, Z Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The autonomous driving industry has mushroomed over the past decade. Although
autonomous driving has undoubtedly become one of the most promising technologies of this …

Analysis of factors affecting IoT-based smart hospital design

BÇ Uslu, E Okay, E Dursun - Journal of Cloud Computing, 2020 - Springer
Currently, rapidly developing digital technological innovations affect and change the
integrated information management processes of all sectors. The high efficiency of these …

Machine-learning-assisted security and privacy provisioning for edge computing: A survey

S Singh, R Sulthana, T Shewale… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …

[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review

S Madan, S Sofat, D Bansal - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …

Attacks against cross-chain systems and defense approaches: A contemporary survey

L Duan, Y Sun, W Ni, W Ding, J Liu… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
The blockchain cross-chain is a significant technology for inter-chain interconnection and
value transfer among different blockchain networks. Cross-chain overcomes the “information …

NeuroTrust—Artificial-neural-network-based intelligent trust management mechanism for large-scale Internet of Medical Things

KA Awan, IU Din, A Almogren… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) provides a diverse platform for healthcare to enhance the
accuracy, reliability, and efficiency. In addition, it utilizes the productivity of available …

[HTML][HTML] An improved deep belief network IDS on IoT-based network for traffic systems

R Malik, Y Singh, ZA Sheikh, P Anand… - Journal of Advanced …, 2022 - hindawi.com
Internet of things (IoT) services are turning out to be more domineering with the rising
security considerations fading with time. All this owes to the propagating heterogeneity and …

Threat model for securing internet of things (IoT) network at device-level

S Rizvi, R Pipetti, N McIntyre, J Todd, I Williams - Internet of Things, 2020 - Elsevier
Abstract The Internet of Things (IoT) creates a theoretical bridge between end-users and the
digital world. The IoT embodies a massive group of interconnected computing devices …

A modular framework for auditing IoT devices and networks

S Rizvi, T Zwerling, B Thompson, S Faiola… - Computers & …, 2023 - Elsevier
In recent years, we have seen significant growth in the use of IoT devices as part of
conventional enterprise networks to increase the operations, services, and functionality of …