A Comprehensive Review of Cyber-Attacks Targeting IoT Systems and Their Security Measures.

ML Mutleg, AM Mahmood… - International Journal of …, 2024 - search.ebscohost.com
Abstract The Internet of Things (IoT) represents the backbone of current and future
technologies. The main objective of IoT is to make human life easier by automating most …

Protected memristive implementations of cryptographic functions

Z Chen, LW Chen, X Zhao, K Li… - Philosophical …, 2025 - royalsocietypublishing.org
Memristive technology mitigates the memory wall issue in von Neumann architectures by
enabling in-memory data processing. Unlike traditional complementary metal-oxide …

A Lightweight Image Encryption Algorithm Based on Secure Key Generation

EK Gbashi, H Alaskar, AJ Hussain - IEEE Access, 2024 - ieeexplore.ieee.org
Data confidentiality and security are important issues due to the sensitivity of the data and its
relationship with users' privacy. Sensitive data includes images and texts that can be …

[PDF][PDF] In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish

SM Radhi, R Ogla - Iraqi Journal of Computers, Communications, Control …, 2023 - iasj.net
Securing information is difficult in the modern internet era, as terabytes of data are
generated daily online and online transactions occur virtually every second. The current …

ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things

N Li, M Ma, H Wang - Sensors, 2024 - mdpi.com
With the increasing demand for a digital world, the Industrial Internet of Things (IIoT) is
growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the …

Deep Learning Based Intrusion Detection System of IoT Technology: Accuracy Versus Computational Complexity.

ML Mutleg, AM Mahmood… - … Journal of Safety & …, 2024 - search.ebscohost.com
Abstract The Internet of Things'(IoT) rapid growth has resulted in a rise in vulnerabilities,
making safeguarding IoT systems against intrusions and illegal access a top priority …

Exploring the Literature of Data Analytics Services on Cloud Computing: A Comprehensive Summary

SS Abdul-Jabbar - Iraqi Journal of Science, 2024 - ijs.uobaghdad.edu.iq
Data generated from the internet and modern applications is extensive and rapidly
expanding. So, all modern applications must successfully perform tasks using this massive …

Monitoring System Based on New Chaotic System and IoT

RA Mohammed, A Alabaichi - Iraqi Journal of Science, 2024 - ijs.uobaghdad.edu.iq
The security and integrity of medical data, in particular, have become significant concerns
due to the substantial expansion in the healthcare environment due to the internet of things …

Kompetensi IoT: Satu Tinjauan Sistematik

NSM Nasir, MS Saud… - International Journal of …, 2023 - myjms.mohe.gov.my
Abstract Integrasi Internet of Things (IoT) dalam hidup dan rutin seharian telah meningkat
secara ketara. Artikel ini membentangkan berkenaan tinjauan komprehensif terhadap …

Investigation of sneak paths in passive crossbar array based on electro-forming free analog memristive devices and their applications in advanced encryption systems

Z Chen - db-thueringen.de
The surging computational demands catalyze a paradigm shift towards memory-centric
computing, with self-rectifying memristive crossbar arrays (srMCAs) as a viable solution …