Cybersecurity and cyber forensics for smart cities: A comprehensive literature review and survey

K Kim, IM Alshenaifi, S Ramachandran, J Kim, T Zia… - Sensors, 2023 - mdpi.com
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial
intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart …

Authentication securing methods for mobile identity: Issues, solutions and challenges

ZA Zukarnain, A Muneer, MK Ab Aziz - Symmetry, 2022 - mdpi.com
Smartphone devices have become an essential part of our daily activities for performing
various essential applications containing very confidential information. For this reason, the …

[PDF][PDF] Low-rate DDoS attack detection using deep learning for SDN-enabled IoT networks

AA Alashhab, MSM Zahid… - International …, 2022 - pdfs.semanticscholar.org
Software Defined Networks (SDN) can logically route traffic and utilize underutilized network
resources, which has enabled the deployment of SDN-enabled Internet of Things (IoT) …

[PDF][PDF] Intrusion detection method for internet of things based on the spiking neural network and decision tree method

AR Zarzoor, NAS Al-Jamali… - International Journal of …, 2023 - academia.edu
(ROC) technique is used with SNN to detect cyber-attacks. The proposed method is
evaluated by comparing its performance with two other methods: IDS-DNN and IDS …

[PDF][PDF] IoT architecture with plug and play for fast deployment and system reliability: AMI platform

B Abdulrazak, S Paul, S Maraoui… - … Conference on Smart …, 2022 - library.oapen.org
The rapid advancement of the Internet of Things (IoT) has reshaped the industrial system,
agricultural system, healthcare systems, and even our daily livelihoods, as the number of IoT …

A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk

P Sotiropoulos, CM Mathas, C Vassilakis… - Electronics, 2023 - mdpi.com
Current Internet of Things (IoT) systems comprise multiple software systems that are
deployed to provide users with the required functionalities. System architects create system …

A lightweight DNN-based ids for detecting IoT cyberattacks in edge computing

TM Hoang, TA Pham, VV Do… - 2022 International …, 2022 - ieeexplore.ieee.org
With the continuous growth of the Internet of Things applications, increasingly sophisticated
and malicious network security attacks have been posing new security requirements. One of …

A survey on the security challenges of low-power wireless communication protocols for communicating concrete in civil engineerings

G Loubet, E Alata, A Takacs, D Dragomirescu - Sensors, 2023 - mdpi.com
With the increase in low-power wireless communication solutions, the deployment of
Wireless Sensor Networks is becoming usual, especially to implement Cyber-Physical …

Authenticating data transfer using RSA-Generated QR Codes

AMS Pangan, IL Lacuesta, RC Mabborang… - European Journal of …, 2022 - ej-compute.org
Lack of security measures for cybersecurity threat is somewhat vulnerable and can even put
one's digital life at high risk of phishing attack which is so alarming nowadays. Perpetrators …

Hyperledger fabric framework with 5G network for blockchain-based security of IoT smart home applications

RF Ali, A Muneer, PDD Dominic… - … Conference on Decision …, 2021 - ieeexplore.ieee.org
In today's world, Internet of Things (IoT) device and data security is still a significant problem.
IoT devices are small and light, with little or no processing capability to run complicated and …