Cyber security threats in cloud: Literature review

R Al Nafea, MA Almaiah - 2021 international conference on …, 2021 - ieeexplore.ieee.org
In recent years, data has been expanding every second in terms of velocity, volume, and
variety. This has resulted in enormous and complex big data, raising challenges in the …

Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions

E Altulaihan, MA Almaiah, A Aljughaiman - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) interconnects physical and virtual objects embedded with
sensors, software, and other technologies, which exchange data using the Internet. This …

A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS

MA Almaiah, F Hajjej, A Ali, MF Pasha, O Almomani - Sensors, 2022 - mdpi.com
Digital healthcare is a composite infrastructure of networking entities that includes the
Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations …

Anomaly based network intrusion detection for IoT attacks using deep learning technique

B Sharma, L Sharma, C Lal, S Roy - Computers and Electrical Engineering, 2023 - Elsevier
Abstract Internet of Things (IoT) applications are growing in popularity for being widely used
in many real-world services. In an IoT ecosystem, many devices are connected with each …

Investigating the effect of perceived security, perceived trust, and information quality on mobile payment usage through near-field communication (NFC) in Saudi …

MA Almaiah, A Al-Rahmi, F Alturise, L Hassan, A Lutfi… - Electronics, 2022 - mdpi.com
This study aims to investigate the perceptions of near-field communication (NFC) usage for
mobile payments in Saudi Arabia. In order to develop a mathematical framework for the …

A lightweight hybrid deep learning privacy preserving model for FC-based industrial internet of medical things

MA Almaiah, A Ali, F Hajjej, MF Pasha, MA Alohali - Sensors, 2022 - mdpi.com
The Industrial Internet of Things (IIoT) is gaining importance as most technologies and
applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to …

An energy-efficient data aggregation mechanism for IoT secured by blockchain

A Ahmed, S Abdullah, M Bukhsh, I Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is getting important and interconnected technologies of the
world, consisting of sensor devices. The internet is smoothly changing from an internet of …

CHOP: Maximum coverage optimization and resolve hole healing problem using sleep and wake-up technique for WSN

V Narayan, AK Daniel - ADCAIJ: Advances in Distributed Computing …, 2022 - torrossa.com
The sensor network domains such as industry, defense, research Wireless Sensor Network
(WSN) is widely used nowadays. The sensor networks are randomly deployed in the …

A new blockchain-based authentication framework for secure IoT networks

AK Al Hwaitat, MA Almaiah, A Ali, S Al-Otaibi… - Electronics, 2023 - mdpi.com
Most current research on decentralized IoT applications focuses on a specific vulnerability.
However, for IoT applications, only a limited number of techniques are dedicated to handling …

Classification of cyber security threats on mobile devices and applications

MA Almaiah, A Al-Zahrani, O Almomani… - Artificial intelligence and …, 2021 - Springer
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …