[HTML][HTML] Federated learning for secure IoMT-applications in smart healthcare systems: A comprehensive review

S Rani, A Kataria, S Kumar, P Tiwari - Knowledge-based systems, 2023 - Elsevier
Recent developments in the Internet of Things (IoT) and various communication
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …

A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues

M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Today is the era of the Internet of Things (IoT). The recent advances in hardware and
information technology have accelerated the deployment of billions of interconnected, smart …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

An analysis of strategies for adopting blockchain technology in the fresh product supply chain

XY Wu, ZP Fan, BB Cao - International Journal of Production …, 2023 - Taylor & Francis
This paper investigates the strategies for adopting blockchain technology in the fresh
product supply chain (FPSC) consisting of a supplier, a third-party logistics service provider …

IoT malicious traffic identification using wrapper-based feature selection mechanisms

M Shafiq, Z Tian, AK Bashir, X Du, M Guizani - Computers & Security, 2020 - Elsevier
Abstract Machine Learning (ML) plays very significant role in the Internet of Things (IoT)
cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms …

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - Ieee …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

A sharding scheme-based many-objective optimization algorithm for enhancing security in blockchain-enabled industrial internet of things

X Cai, S Geng, J Zhang, D Wu, Z Cui… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
While the industrial Internet of Things (IIoT) can support efficient control of the physical world
through large amounts of industrial data, data security has been a challenge due to various …

[HTML][HTML] A systematic literature map** on secure identity management using blockchain technology

T Rathee, P Singh - Journal of King Saud University-Computer and …, 2022 - Elsevier
After the acceptance of blockchain technology, there have been applications which aim to
use blockchain in their fields. Various approaches have been proposed in past to build a …

A Reliable and Secure Permissioned Blockchain‐Assisted Data Transfer Mechanism in Healthcare‐Based Cyber‐Physical Systems

P Vinayasree, AM Reddy - Concurrency and Computation …, 2025 - Wiley Online Library
Healthcare systems are highly sensitive to cyberattacks as these systems possess most of
the sensitive information compared to other systems relying on internet facilities. Due to the …

Deep learning based emotion analysis of microblog texts

D Xu, Z Tian, R Lai, X Kong, Z Tan, W Shi - Information Fusion, 2020 - Elsevier
Traditional text emotion analysis methods are primarily devoted to studying extended texts,
such as news reports and full-length documents. Microblogs are considered short texts that …