An overview on smart contracts: Challenges, advances and platforms

Z Zheng, S Xie, HN Dai, W Chen, X Chen… - Future Generation …, 2020 - Elsevier
Smart contract technology is reshaping conventional industry and business processes.
Being embedded in blockchains, smart contracts enable the contractual terms of an …

A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques

V Chamola, P Kotesh, A Agarwal, N Gupta, M Guizani - Ad hoc networks, 2021 - Elsevier
Abstract Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this
decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier …

Integrating blockchain and the internet of things in precision agriculture: Analysis, opportunities, and challenges

M Torky, AE Hassanein - Computers and Electronics in Agriculture, 2020 - Elsevier
Blockchain quickly became an important technology in many applications of precision
agriculture discipline. The need to develop smart P2P systems capable of verifying …

A survey of machine and deep learning methods for internet of things (IoT) security

MA Al-Garadi, A Mohamed, AK Al-Ali… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) integrates billions of smart devices that can communicate with
one another with minimal human intervention. IoT is one of the fastest developing fields in …

A survey of healthcare Internet of Things (HIoT): A clinical perspective

H Habibzadeh, K Dinesh, OR Shishvan… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In combination with current sociological trends, the maturing development of Internet of
Things devices is projected to revolutionize healthcare. A network of body-worn sensors …

The role of big data analytics in industrial Internet of Things

MH ur Rehman, I Yaqoob, K Salah, M Imran… - Future Generation …, 2019 - Elsevier
Big data production in industrial Internet of Things (IIoT) is evident due to the massive
deployment of sensors and Internet of Things (IoT) devices. However, big data processing is …

Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection

I Ahmad, M Basheri, MJ Iqbal, A Rahim - IEEE access, 2018 - ieeexplore.ieee.org
Intrusion detection is a fundamental part of security tools, such as adaptive security
appliances, intrusion detection systems, intrusion prevention systems, and firewalls. Various …

A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services

I Stellios, P Kotzanikolaou, M Psarakis… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no
surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some …

Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges

I Yaqoob, IAT Hashem, A Ahmed, SMA Kazmi… - Future Generation …, 2019 - Elsevier
The explosive growth of smart objects and their dependency on wireless technologies for
communication increases the vulnerability of Internet of Things (IoT) to cyberattacks …

The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …