Security and privacy issues in software-defined networking (SDN): A systematic literature review
Software-defined network (SDNs) have fundamentally changed network infrastructure by
decoupling the data plane and the control plane. This architectural shift rejuvenates the …
decoupling the data plane and the control plane. This architectural shift rejuvenates the …
Medical image encryption: a comprehensive review
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …
imaging technology and methods for analyzing medical images advance, there will be a …
Deep learning-based fault diagnosis of servo motor bearing using the attention-guided feature aggregation network
This paper introduces a novel approach to fault detection in the servo motor bearings of
industrial robots within the context of Industry 4.0 prognostics and health management. The …
industrial robots within the context of Industry 4.0 prognostics and health management. The …
A Review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges
Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the
generation of knowledge, typically using machine learning techniques, and the …
generation of knowledge, typically using machine learning techniques, and the …
Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …
Security, privacy, and robustness for trustworthy AI systems: A review
MM Saeed, M Alsharidah - Computers and Electrical Engineering, 2024 - Elsevier
This review article provides a comprehensive exploration of the key pillars of trustworthy AI:
security privacy and robustness. The article delved into security measures both traditional …
security privacy and robustness. The article delved into security measures both traditional …
The metaverse digital environments: a sco** review of the challenges, privacy and security issues
The concept of the “metaverse” has garnered significant attention recently, positioned as the
“next frontier” of the internet. This emerging digital realm carries substantial economic and …
“next frontier” of the internet. This emerging digital realm carries substantial economic and …
Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—
fog computing—are the most in-demand services at the present time. Cloud and fog …
fog computing—are the most in-demand services at the present time. Cloud and fog …
LELBC: A low energy lightweight block cipher for smart agriculture
Q Song, L Li, X Huang - Internet of Things, 2024 - Elsevier
The massive collection and transmission of various crop and livestock data in smart
agriculture leads to serious security concerns. Furthermore, many Internet of Things (IoT) …
agriculture leads to serious security concerns. Furthermore, many Internet of Things (IoT) …
Post-quantum authentication in the MQTT protocol
J Samandari, C Gritti - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Message Queue Telemetry Transport (MQTT) is a common communication protocol used in
the Internet of Things (IoT). MQTT is a simple, lightweight messaging protocol used to …
the Internet of Things (IoT). MQTT is a simple, lightweight messaging protocol used to …