[HTML][HTML] Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review

M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …

[HTML][HTML] Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions

E Altulaihan, MA Almaiah, A Aljughaiman - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) interconnects physical and virtual objects embedded with
sensors, software, and other technologies, which exchange data using the Internet. This …

Internet of things: Device capabilities, architectures, protocols, and smart applications in healthcare domain

MM Islam, S Nooruddin, F Karray… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Nowadays, the Internet has spread to practically every country around the world and is
having unprecedented effects on people's lives. The Internet of Things (IoT) is getting more …

A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

[HTML][HTML] Towards secure and intelligent internet of health things: A survey of enabling technologies and applications

U Zaman, Imran, F Mehmood, N Iqbal, J Kim, M Ibrahim - Electronics, 2022 - mdpi.com
With the growth of computing and communication technologies, the information processing
paradigm of the healthcare environment is evolving. The patient information is stored …

Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications

TM Ghazal, MAM Afifi, D Kalra - Solid State …, 2020 - research.skylineuniversity.ac.ae
The proposed research is based on the solutions for the Internet of Things (IoT) security
threats and vulnerability. It is cleared that IoT is playing a vital role now a day at an …

[HTML][HTML] Privacy-preserving blockchain framework for supply chain management: Perceptive Craving Game Search Optimization (PCGSO)

B Aljabhan, MA Obaidat - Sustainability, 2023 - mdpi.com
The fierce competition in international markets and the rapid advancements in information
technology result in shorter lead times, lower transportation capacity, and higher demand …

[PDF][PDF] Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment

AM Albalawi, MA Almaiah - J. Theor. Appl. Inf. Technol, 2022 - researchgate.net
ABSTRACT Despite Internet of Things (IoT) technology has a great potential to connect
devices and sensors through communication media, such as Wi-Fi, to the internet and …

Current research trends in IoT security: a systematic mapping study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

[HTML][HTML] Remote interference discrimination testbed employing AI ensemble algorithms for 6G TDD networks

H Zhang, T Zhou, T Xu, H Hu - Sensors, 2023 - mdpi.com
The Internet-of-Things (IoT) massive access is a significant scenario for sixth-generation
(6G) communications. However, low-power IoT devices easily suffer from remote …