Cybersecurity Risk Analysis in the IoT: A Systematic Review

TS AlSalem, MA Almaiah, A Lutfi - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising
significant concerns about future cybersecurity risks and the need for reliable solutions. This …

Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review

S Kalhoro, M Rehman, V Ponnusamy… - IEEE Access, 2021 - ieeexplore.ieee.org
The advent of new technologies and the rapid growth of internet users have given birth to
the menace of cyber-crime. Unfortunately, it is increasing at an alarming pace. This situation …

Dynamic analysis for IoT malware detection with convolution neural network model

J Jeon, JH Park, YS Jeong - Ieee Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected
society where all things are connected and exchange information through the Internet. IoT …

Parameterized algorithms of fundamental NP-hard problems: a survey

W Li, Y Ding, Y Yang, RS Sherratt, JH Park… - … -centric Computing and …, 2020 - Springer
Parameterized computation theory has developed rapidly over the last two decades. In
theoretical computer science, it has attracted considerable attention for its theoretical value …

Internet of things forensic data analysis using machine learning to identify roots of data scavenging

PM Shakeel, S Baskar, H Fouad, G Manogaran… - Future Generation …, 2021 - Elsevier
In this paper, we proposed the blockchain-assisted shared audit framework (BSAF) to
analyze digital forensic data in the IoT platform. The proposed framework was designed to …

Two-stage hybrid malware detection using deep learning

S Baek, J Jeon, B Jeong, YS Jeong - 2021 - scholarworks.bwise.kr
With the increasing number and variety of Internet of Things (IoT) devices supporting a wide
range of services such as smart homes, smart transportation, and smart factories in smart …

Blockchain and federated learning-based distributed computing defence framework for sustainable society

PK Sharma, JH Park, K Cho - Sustainable Cities and Society, 2020 - Elsevier
Ensuring social security through the defense organization determines the creation of links
between the army and society. Realizing the benefits of the Internet of Battle Things in the …

[PDF][PDF] M-IDM: A Multi-Classification Based Intrusion Detection Model in Healthcare IoT.

JD Lee, HS Cha, S Rathore… - Computers, Materials & …, 2021 - researchgate.net
In recent years, the application of a smart city in the healthcare sector via loT systems has
continued to grow exponentially and various advanced network intrusions have emerged …

Predicting individual differences to cyber attacks: Knowledge, arousal, emotional and trust responses

A Pyke, E Rovira, S Murray, J Pritts… - Cyberpsychology …, 2021 - cyberpsychology.eu
Cyber attacks are increasingly commonplace and cause significant disruption, and
therefore, have been a focus of much research. The objective of this research was to …

The effect of eye movements and cultural factors on product color selection

B Wu, Y Zhu, K Yu, S Nishimura, Q Jin - Human-centric Computing and …, 2020 - Springer
A color is a powerful tool used to attract people's attention and to entice them to purchase a
product. However, the way in which a specific color influences people's color selection and …