[HTML][HTML] Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls

S Zahid, MS Mazhar, SG Abbas, Z Hanif, S Hina… - Internet of Things, 2023 - Elsevier
Industrial automation technologies are envisioned as multi-device systems that are
constantly interacting with one another and with enterprise systems. In these industrial …

Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review

R Reyes-Acosta, C Dominguez-Baez… - International Journal of …, 2025 - Springer
This study introduces the implementation of a Multivocal Literature Review (MLR) approach
to analyze machine learning (ML) and deep learning (DL) strategies for securing the …

Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system

S Khan, Z Jiangbin, F Ullah, MP Akhter, S Khan… - PeerJ Computer …, 2024 - peerj.com
In the distributed computing era, cloud computing has completely changed organizational
operations by facilitating simple access to resources. However, the rapid development of the …

A Graph Convolutional Networks-Based DDoS Detection Model

BJ Saunders, P Kisanga, GHS Carvalho… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
Network attacks have exponentially increased over the last years and, seriously, impacting
fundamental aspects of our modern society at all levels, ie, individual, critical infrastructure …

Securing the Internet of Things: AI-Powered Threat Detection and Safety

L Arya, YK Sharma, S Devi… - … Conference on Recent …, 2024 - books.google.com
Abstract The Internet of Things (IoT) connects physical and virtual objects through sensors
and software, enabling data exchange over the Internet. While it enhances our lives with …

Securing the Internet of Things: AI-Powered Threat Detection and Safety Measures

L Arya, YK Sharma, S Devi, H Padmanaban… - … Conference on Recent …, 2023 - Springer
Abstract The Internet of Things (IoT) connects physical and virtual objects through sensors
and software, enabling data exchange over the Internet. While it enhances our lives with …

[PDF][PDF] Matrix-Based Graph Comparison Method for Behavioural Patterns Analysis with Application to Anomaly Detection Using Machine Learning in Wireless Multi …

R Zakrzewski - 2024 - research-information.bris.ac.uk
The digital world we live in emphasises the importance of data. From an end-user
perspective, data content and availability are important as they help to meet users' demands …

Soluciones de seguridad en sistemas iot de hogares inteligentes para mitigar riesgos y vulnerabilidades mediante la realización de pruebas de penetración

MI Araujo Robalino - 2024 - repositorio.uta.edu.ec
Abstract The Internet of Things (IoT) is revolutionizing the intercommunication between
smart home devices. However, the security of these systems faces security challenges as …

Emergency logistics system based on block chain technology

S Zhang, D Chen, L Zhang, G Chen - IET Conference Proceedings CP815, 2022 - IET
After the third breakthrough development of blockchain technology and entering the
mainstream stage, the comprehensive application of blockchain technology has built a large …

[PDF][PDF] World of Science: Journal on Modern Research Methodologies

CO Qader, AZ Ablahd - researchgate.net
The growing reliance on computer systems and the increasing interconnectedness of the
digital world have amplified the significance of computer cyber security. This survey aims to …