Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things

B Ghimire, DB Rawat - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the
emerging Internet of Things (IoT) has gained a lot of attention from the government …

A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

Integration of blockchain and cloud of things: Architecture, applications and challenges

DC Nguyen, PN Pathirana, M Ding… - … surveys & tutorials, 2020 - ieeexplore.ieee.org
The blockchain technology is taking the world by storm. Blockchain with its decentralized,
transparent and secure nature has emerged as a disruptive technology for the next …

A survey of voice pathology surveillance systems based on internet of things and machine learning algorithms

FT Al-Dhief, NMA Latiff, NNNA Malik, NS Salim… - IEEE …, 2020 - ieeexplore.ieee.org
The incorporation of the cloud technology with the Internet of Things (IoT) is significant in
order to obtain better performance for a seamless, continuous, and ubiquitous framework …

State-of-the-art review on IoT threats and attacks: Taxonomy, challenges and solutions

RR Krishna, A Priyadarshini, AV Jha, B Appasani… - Sustainability, 2021 - mdpi.com
The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects
that are embedded with sensors, software, and other technologies intending to connect and …

[HTML][HTML] A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security

M Ali, LT Jung, AH Sodhro, AA Laghari… - Alexandria Engineering …, 2023 - Elsevier
Rapid development and massive use of Information Technology (IT) have since produced a
massive amount of electronic data. In tandem, the demand for data outsourcing and the …

RETRACTED ARTICLE: IoT based home monitoring system with secure data storage by Keccak–Chaotic sequence in cloud server

S Ravikumar, D Kavitha - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Internet of things (IoT) has become an integral part of today's technological revolution, which
enhances the people's quality of life. The IoT paradigm makes the world smarter and is …

[HTML][HTML] A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization

D Ahamad, SA Hameed, M Akhtar - … of King Saud University-Computer and …, 2022 - Elsevier
The rising volume of sensitive and personal data being harvested by data controllers has
increased the security essentials in the cloud system. The cloud module is not used just to …

Statistical analysis of remote health monitoring based IoT security models & deployments from a pragmatic perspective

K Ashok, S Gopikrishnan - IEEE Access, 2023 - ieeexplore.ieee.org
Remote health monitoring-based Internet of Things (IoT) network security is a multi-domain
task, that involves identification of network attack, evaluation of mitigation strategies, design …

Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system

P Chinnasamy, P Deepalakshmi, AK Dutta, J You… - Mathematics, 2021 - mdpi.com
People can store their data on servers in cloud computing and allow public users to access
data via data centers. One of the most difficult tasks is to provide security for the access …