Security and privacy issues in software-defined networking (SDN): A systematic literature review

MS Farooq, S Riaz, A Alvi - Electronics, 2023 - mdpi.com
Software-defined network (SDNs) have fundamentally changed network infrastructure by
decoupling the data plane and the control plane. This architectural shift rejuvenates the …

Medical image encryption: a comprehensive review

ST Ahmed, DA Hammood, RF Chisab, A Al-Naji… - Computers, 2023 - mdpi.com
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …

Deep learning-based fault diagnosis of servo motor bearing using the attention-guided feature aggregation network

I Raouf, P Kumar, HS Kim - Expert Systems with Applications, 2024 - Elsevier
This paper introduces a novel approach to fault detection in the servo motor bearings of
industrial robots within the context of Industry 4.0 prognostics and health management. The …

A Review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges

PADSN Wijesekara, S Gunawardena - Network, 2023 - mdpi.com
Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the
generation of knowledge, typically using machine learning techniques, and the …

Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …

Security, privacy, and robustness for trustworthy AI systems: A review

MM Saeed, M Alsharidah - Computers and Electrical Engineering, 2024 - Elsevier
This review article provides a comprehensive exploration of the key pillars of trustworthy AI:
security privacy and robustness. The article delved into security measures both traditional …

The metaverse digital environments: a sco** review of the challenges, privacy and security issues

M Tukur, J Schneider, M Househ, AH Dokoro… - Frontiers in big …, 2023 - frontiersin.org
The concept of the “metaverse” has garnered significant attention recently, positioned as the
“next frontier” of the internet. This emerging digital realm carries substantial economic and …

Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey

Shruti, S Rani, DK Sah, G Gianini - Sensors, 2023 - mdpi.com
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—
fog computing—are the most in-demand services at the present time. Cloud and fog …

LELBC: A low energy lightweight block cipher for smart agriculture

Q Song, L Li, X Huang - Internet of Things, 2024 - Elsevier
The massive collection and transmission of various crop and livestock data in smart
agriculture leads to serious security concerns. Furthermore, many Internet of Things (IoT) …

Post-quantum authentication in the MQTT protocol

J Samandari, C Gritti - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Message Queue Telemetry Transport (MQTT) is a common communication protocol used in
the Internet of Things (IoT). MQTT is a simple, lightweight messaging protocol used to …