Cyber security in iot-based cloud computing: A comprehensive survey

W Ahmad, A Rasool, AR Javed, T Baker, Z Jalil - Electronics, 2021 - mdpi.com
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

Blockchain integration for IoT-enabled V2X communications: a comprehensive survey, security issues and challenges

PM Rao, S Jangirala, S Pedada, AK Das, Y Park - IEEE Access, 2023 - ieeexplore.ieee.org
In V2X (vehicle-to-everything) communication, there is a two-way communication among the
vehicle (s) and other Internet of Things (IoT)-enabled smart devices around it that may …

Social Networking Security during COVID‐19: A Systematic Literature Review

R Abid, M Rizwan, P Veselý, A Basharat… - Wireless …, 2022 - Wiley Online Library
During the Covid‐19 Pandemic, the usage of social media networks increased
exponentially. People engage in education, business, shop**, and other social activities …

[PDF][PDF] Light Weight Circular Error Learning Algorithm (CELA) for Secure Data Communication Protocol in IoT-Cloud Systems

N Mangala, KR Venugopal - International Journal of …, 2023 - pdfs.semanticscholar.org
The data driven smart applications, utilize the IoT, Cloud Computing, AI and other digital
technologies to create, curate and operate on large amounts of data to provide intelligent …

[PDF][PDF] Intelligent transport system using IoT-V2X: communication technologies, security issues, challenges and countermeasures

P Saraswathi, GVS RAJKUMAR, PM Rao - 2022 - scholar.archive.org
Abstract The Internet of Things (IoT) has become an essential part of today's human lives. It
provides various services in various domains such as large-scale industrial systems …

Challenges, Attacks, and Countermeasures for Security in MANETs-IoT

A Priyam, A Yadav - International Conference on Cryptology & Network …, 2023 - Springer
Abstract The integration of Mobile Ad hoc Networks and the Internet of Things offers
innovative applications but also presents significant security challenges. This paper …

An Artificial Intelligence Approach for Malware Detection Using Deep Learning

P Saraswathi, VV Krishna, DV Yashwanth… - … Conference on Data …, 2023 - Springer
Computer users, organizations, and governments are all seeing an exponential
development in the number of malware assaults. When it comes to determining the nature of …

Impacts Of Cyber Security In Iot-Based Cloud Computing

LJ Gadhavi, MV Vaghasia - Journal of Namibian Studies …, 2023 - namibian-studies.com
Cloud computing contributes the elastic and extensible architecture in which resources and
data are scattered at different regions and accessible from anywhere. Cloud computing …

An Improved Locality-Sensitive Hashing-Based Recommender Approach in a Distributed Environment

A Anupama, P Saraswathi, P Muralidhara Rao… - Recent Trends in …, 2022 - Springer
With the rising of the service computing paradigm grows in popularity, huge amounts of
systems and resources are becoming available very quickly on the Web, creating major …