A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions

KJ Raval, NK Jadav, T Rathod, S Tanwar… - International journal of …, 2024 - Elsevier
Technologies such as artificial intelligence (AI), blockchain, and the Internet of Things (IoT)
have converged in driving the next wave of digital revolution. Amalgamating the …

Metaverse for wireless systems: Architecture, advances, standardization, and open challenges

LU Khan, M Guizani, D Niyato, A Al-Fuqaha, M Debbah - Internet of Things, 2024 - Elsevier
The growing landscape of emerging wireless applications is a key driver towards the
development of novel wireless system designs. Such a design can be based on a metaverse …

A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications

Z Wenhua, MK Hasan, NB Jailani, S Islam… - Computers in Human …, 2024 - Elsevier
Telehealth, a cornerstone of Healthcare 4.0 has widespread adoption owing to its
convenience and efficiency. However, the secure transmission of patient records over the …

[HTML][HTML] A review of AI for optimization of 3D printing of sustainable polymers and composites

M Hassan, M Misra, GW Taylor, AK Mohanty - Composites Part C: Open …, 2024 - Elsevier
In recent years, 3D printing has experienced significant growth in the manufacturing sector
due to its ability to produce intricate and customized components. The advent of Industry 4.0 …

Diagnostic performance evaluation of multiparametric magnetic resonance imaging in the detection of prostate cancer with supervised machine learning methods

H Nematollahi, M Moslehi, F Aminolroayaei, M Maleki… - Diagnostics, 2023 - mdpi.com
Prostate cancer is the second leading cause of cancer-related death in men. Its early and
correct diagnosis is of particular importance to controlling and preventing the disease from …

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously developing field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …

A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks

A Sharma, K Bhushan - Cluster Computing, 2024 - Springer
IoT application uses MQTT, an application layer protocol that facilitates machine-to-machine
communication using a central entity called broker. The vulnerability lies in the broker being …

Securing access to internet of medical things using a graphical-password-based user authentication scheme

MA Khan, IU Din, A Almogren - Sustainability, 2023 - mdpi.com
Digital healthcare services have seen significant growth in this decade and many new
technologies have been thoroughly examined to provide efficient services through secure …

[PDF][PDF] Enhancing Security with Multi-Factor User Behavior Identification Via Longest Common Subsequence Analysis

B Shannaq, M Shakir - Informatica, 2024 - researchgate.net
Enter short title in File/Properties/Summary Page 1 https://doi.org/10.31449/inf.v48i19.6270
Informatica 48 (2024) 57–72 57 Enhancing Security with Multi-Factor User Behavior Identification …

[HTML][HTML] An Android-Based Internet of Medical Things Adaptive User Authentication and Authorization Model for the Elderly

PM Mavhemwa, M Zennaro, P Nsengiyumva… - … of Cybersecurity and …, 2024 - mdpi.com
Globally, 77% of the elderly aged 65 and above suffer from multiple chronic ailments,
according to recent research. However, several barriers within the healthcare system in the …