[PDF][PDF] Contribution of the IoT to the Security System

Z Abdulkadir, A Ibrahim, MA Baballe… - J Math Techniques …, 2023 - opastpublishers.com
Utilizing the internet of things (IoT), it is now possible to secure people's lives, businesses,
schools, organizations, and residences utilizing alarm security systems that will monitor …

[PDF][PDF] Management of vulnerabilities in cyber security

S Muhammad, AM Lawan… - Journal homepage: https …, 2023 - academia.edu
Cybercriminals frequently use phishing attempts to trick unwary individuals into disclosing
their personal information. The detection of the cybersecurity (CS) state of Internet of Things …

Cyber Warfare And National Security: Imperative For Naval Operations

AM Ahmed, A Hussaini… - 2022 International …, 2022 - ieeexplore.ieee.org
The increase in the reliance on an application of digital technologies in the 21st Century has
triggered several cyber threats that threaten national security in various dimensions. To keep …

Secured digital-twin data service for the Internet of smart things

M Qian, C Qian, A Hussaini, G Xu, W Liao, W Yu - Smart Spaces, 2024 - Elsevier
As the vision for connecting things, the Internet of Things (IoT) technology has been widely
adopted to support a variety of applications, including smart transportation, smart electricity …

For-profit versus non-profit cybersecurity posture: breach types and locations in healthcare organisations

M Ignatovski - Health Information Management Journal, 2023 - journals.sagepub.com
Background The implementation of emerging technologies has resulted in an increase of
data breaches in healthcare organisations, especially during the COVID-19 pandemic …

Cyber-Security and the Changing Landscape of Critical National Infrastructure: State and Non-state Cyber-Attacks on Organisations, Systems and Services

J Rees, CJ Rees - Applications for Artificial Intelligence and Digital …, 2023 - Springer
The main aim of this chapter is to identify and explore key issues relating to cyber-attacks on
critical national infrastructure. The chapter commences by clarifying the term critical national …

STUDYING COMPARATIVE CLOUD COMPUTING TECHNOLOGY

AY Abdullahi, MI Bello, SA Sani… - Far East Journal of …, 2023 - pphmjopenaccess.com
In order to provide quicker innovation, adaptable resources, and scale economies, cloud
computing is the supply of computing services, including servers, storage, databases …

Challenges with Internet of Things (IoT) Security

MB Ahmad, MA Said, MD Mohammed - IPHO-Journal of Advance …, 2024 - iphopen.org
Abstract The phrase" Internet of Things Security" refers to a broad category of tactics,
equipment, procedures, frameworks, and techniques utilized to safeguard every facet of the …

Cyber-aware threats and management strategies in cloud environments

ВВ Любченко, ДВ Волков - Вісник сучасних інформаційних технологій, 2024 - hait.od.ua
The paper provides an overview of cyber threats within cloud computing and proposes
effective management strategies. The transition to cloud services has introduced significant …

Analysis of Datasets for Machine Learning-Based Cybersecurity Models

T Ferrão, GA Caetano, SC Turra - Available at SSRN 4816303 - papers.ssrn.com
Currently, significant advancements are being made in enhancing communication
technologies through the introduction of new network architectures that can integrate …