[HTML][HTML] AI in IIoT management of cybersecurity for industry 4.0 and industry 5.0 purposes

G Czeczot, I Rojek, D Mikołajewski, B Sangho - Electronics, 2023 - mdpi.com
If we look at the chronology of transitions between successive stages of industrialization, it is
impossible not to notice a significant acceleration. There were 100 years between the …

[HTML][HTML] A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems

S Selvarajan, H Mouratidis - Scientific Reports, 2023 - nature.com
Many researchers have been interested in healthcare cybersecurity for a long time since it
can improve the security of patient and health record data. As a result, a lot of research is …

[HTML][HTML] A new blockchain-based authentication framework for secure IoT networks

AK Al Hwaitat, MA Almaiah, A Ali, S Al-Otaibi… - Electronics, 2023 - mdpi.com
Most current research on decentralized IoT applications focuses on a specific vulnerability.
However, for IoT applications, only a limited number of techniques are dedicated to handling …

Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model

XH Nguyen, KH Le - Internet of Things, 2023 - Elsevier
The fourth industrial revolution is marked by the rapid growth of Internet of Things (IoT)
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …

Revolutionizing cyber threat detection with large language models

MA Ferrag, M Ndhlovu, N Tihanyi, LC Cordeiro… - arXiv preprint arXiv …, 2023 - arxiv.org
Natural Language Processing (NLP) domain is experiencing a revolution due to the
capabilities of Pre-trained Large Language Models (LLMs), fueled by ground-breaking …

[HTML][HTML] Federated learning optimization: A computational blockchain process with offloading analysis to enhance security

S Shitharth, H Manoharan, A Shankar… - Egyptian informatics …, 2023 - Elsevier
Abstract The Internet of Things (IoT) technology in various applications used in data
processing systems requires high security because more data must be saved in cloud …

[HTML][HTML] A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city …

S Shitharth, AM Alshareef, AO Khadidos, KH Alyoubi… - Scientific Reports, 2023 - nature.com
Ensuring the privacy and trustworthiness of smart city—Internet of Things (IoT) networks
have recently remained the central problem. Cyborg intelligence is one of the most popular …

[HTML][HTML] A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models

OBJ Rabie, S Selvarajan, T Hasanin, AM Alshareef… - Scientific Reports, 2024 - nature.com
Abstract The Internet of Things (IoT) is extensively used in modern-day life, such as in smart
homes, intelligent transportation, etc. However, the present security measures cannot fully …

[HTML][HTML] A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor …

OBJ Rabie, S Selvarajan, T Hasanin… - International Journal of …, 2024 - Springer
The dynamic connectivity and functionality of sensors has revolutionized remote monitoring
applications thanks to the combination of IoT and wireless sensor networks (WSNs) …

[HTML][HTML] BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization

G Ali, M ElAffendi, N Ahmad - Plos one, 2023 - journals.plos.org
Intelligent Transport System (ITS) offers inter-vehicle communication, safe driving, road
condition updates, and intelligent traffic management. This research intends to propose a …