A Comprehensive Review of Cyber-Attacks Targeting IoT Systems and Their Security Measures.
ML Mutleg, AM Mahmood… - International Journal of …, 2024 - search.ebscohost.com
Abstract The Internet of Things (IoT) represents the backbone of current and future
technologies. The main objective of IoT is to make human life easier by automating most …
technologies. The main objective of IoT is to make human life easier by automating most …
Protected memristive implementations of cryptographic functions
Memristive technology mitigates the memory wall issue in von Neumann architectures by
enabling in-memory data processing. Unlike traditional complementary metal-oxide …
enabling in-memory data processing. Unlike traditional complementary metal-oxide …
A Lightweight Image Encryption Algorithm Based on Secure Key Generation
Data confidentiality and security are important issues due to the sensitivity of the data and its
relationship with users' privacy. Sensitive data includes images and texts that can be …
relationship with users' privacy. Sensitive data includes images and texts that can be …
[PDF][PDF] In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish
SM Radhi, R Ogla - Iraqi Journal of Computers, Communications, Control …, 2023 - iasj.net
Securing information is difficult in the modern internet era, as terabytes of data are
generated daily online and online transactions occur virtually every second. The current …
generated daily online and online transactions occur virtually every second. The current …
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things
With the increasing demand for a digital world, the Industrial Internet of Things (IIoT) is
growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the …
growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the …
Deep Learning Based Intrusion Detection System of IoT Technology: Accuracy Versus Computational Complexity.
ML Mutleg, AM Mahmood… - … Journal of Safety & …, 2024 - search.ebscohost.com
Abstract The Internet of Things'(IoT) rapid growth has resulted in a rise in vulnerabilities,
making safeguarding IoT systems against intrusions and illegal access a top priority …
making safeguarding IoT systems against intrusions and illegal access a top priority …
Exploring the Literature of Data Analytics Services on Cloud Computing: A Comprehensive Summary
SS Abdul-Jabbar - Iraqi Journal of Science, 2024 - ijs.uobaghdad.edu.iq
Data generated from the internet and modern applications is extensive and rapidly
expanding. So, all modern applications must successfully perform tasks using this massive …
expanding. So, all modern applications must successfully perform tasks using this massive …
Monitoring System Based on New Chaotic System and IoT
RA Mohammed, A Alabaichi - Iraqi Journal of Science, 2024 - ijs.uobaghdad.edu.iq
The security and integrity of medical data, in particular, have become significant concerns
due to the substantial expansion in the healthcare environment due to the internet of things …
due to the substantial expansion in the healthcare environment due to the internet of things …
Kompetensi IoT: Satu Tinjauan Sistematik
NSM Nasir, MS Saud… - International Journal of …, 2023 - myjms.mohe.gov.my
Abstract Integrasi Internet of Things (IoT) dalam hidup dan rutin seharian telah meningkat
secara ketara. Artikel ini membentangkan berkenaan tinjauan komprehensif terhadap …
secara ketara. Artikel ini membentangkan berkenaan tinjauan komprehensif terhadap …
Investigation of sneak paths in passive crossbar array based on electro-forming free analog memristive devices and their applications in advanced encryption systems
Z Chen - db-thueringen.de
The surging computational demands catalyze a paradigm shift towards memory-centric
computing, with self-rectifying memristive crossbar arrays (srMCAs) as a viable solution …
computing, with self-rectifying memristive crossbar arrays (srMCAs) as a viable solution …