Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures

I Butun, P Österberg, H Song - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) constitute one of the most promising third-millennium
technologies and have wide range of applications in our surrounding environment. The …

[HTML][HTML] Insights into Internet of Medical Things (IoMT): Data fusion, security issues and potential solutions

SF Ahmed, MSB Alam, S Afrin, SJ Rafa, N Rafa… - Information …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) has created a wide range of opportunities for
knowledge exchange in numerous industries. The opportunities include patient …

A survey on emerging SDN and NFV security mechanisms for IoT systems

I Farris, T Taleb, Y Khettab… - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
The explosive rise of Internet of Things (IoT) systems have notably increased the potential
attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

A survey on security threats and countermeasures in internet of medical things (IoMT)

M Papaioannou, M Karageorgou… - Transactions on …, 2022 - Wiley Online Library
Internet of medical things (IoMT) is an emerging technology aiming to improve the patient's
quality of life by enabling personalized e‐health services without limitations on time and …

Cnn-based cascaded multi-task learning of high-level prior and density estimation for crowd counting

VA Sindagi, VM Patel - … on advanced video and signal based …, 2017 - ieeexplore.ieee.org
Estimating crowd count in densely crowded scenes is an extremely challenging task due to
non-uniform scale variations. In this paper, we propose a novel end-to-end cascaded …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

SDN/NFV architectures for edge-cloud oriented IoT: A systematic review

PP Ray, N Kumar - Computer Communications, 2021 - Elsevier
Software-defined network (SDN) and network function virtualization (NFV) have entirely
changed the way internetwork backhaul should be utilized and behaved for virtualized …

Perception layer security in Internet of Things

HA Khattak, MA Shah, S Khan, I Ali, M Imran - Future Generation Computer …, 2019 - Elsevier
Abstract Internet of Things (IoT) is one of the rising innovations of the current era that has
largely attracted both the industry and the academia. Life without the IoT is entirely …