[HTML][HTML] Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review

S Messinis, N Temenos, NE Protonotarios… - Computers in Biology …, 2024 - Elsevier
Over the past five years, interest in the literature regarding the security of the Internet of
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …

Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts

L Khaloopour, Y Su, F Raskob, T Meuser, R Bless… - IEEE …, 2024 - ieeexplore.ieee.org
The sixth generation (6G) mobile communication networks are expected to intelligently
integrate into various aspects of modern digital society, including smart cities, homes, health …

[HTML][HTML] Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition

Y Baseri, V Chouhan, A Ghorbani, A Chow - Computers & Security, 2025 - Elsevier
The rise of large-scale quantum computing poses a significant threat to traditional
cryptographic security measures. Quantum attacks, particularly targeting the mathematical …

Distributed deep neural-network-based middleware for cyber-attacks detection in smart IoT ecosystem: A novel framework and performance evaluation approach

G Bhandari, A Lyth, A Shalaginov, TM Grønli - Electronics, 2023 - mdpi.com
Cyberattacks always remain the major threats and challenging issues in the modern digital
world. With the increase in the number of internet of things (IoT) devices, security challenges …

How could quantum computing shape information systems research–An editorial perspective and future research directions

AK Kar, W He, FC Payton, V Grover… - International Journal of …, 2024 - Elsevier
Quantum computing promises to be the next frontier of change that will transform the
information and communication technology ecosystem. Governments and multinational firms …

An enhanced architecture to resolve public-key cryptographic issues in the internet of things (IoT), employing quantum computing supremacy

S Shamshad, F Riaz, R Riaz, SS Rizvi, S Abdulla - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the
importance of securing all four aspects of the IoT model: sensors, networks, cloud, and …

A quantum-based approach for offensive security against cyber attacks in electrical infrastructure

D Lakshmi, N Nagpal, S Chandrasekaran - Applied Soft Computing, 2023 - Elsevier
Deciding the correct offensive security strategy for safeguarding the electrical physical
infrastructures of smart grids is a challenging task. The offensive security training against …

The new frontier of cybersecurity: emerging threats and innovations

D Dave, G Sawhney, P Aggarwal… - 2023 29th …, 2023 - ieeexplore.ieee.org
In today's digitally interconnected world, cybersecurity threats have reached unprecedented
levels, presenting a pressing concern for individuals, organizations, and governments. This …

Automated vulnerability detection in source code using quantum natural language processing

MS Akter, H Shahriar, ZA Bhuiya - International Conference on Ubiquitous …, 2022 - Springer
One of the most important challenges in the field of software code audit is the presence of
vulnerabilities in software source code. Every year, more and more software flaws are found …

Cybersecurity and prevention in the quantum era

A Dwivedi, GK Saini, UI Musa - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Emerging future technologies such as Quantum computer is a serious threat to the privacy
and security of user data and organizational security. The speed of outperforming classical …