Cyber security in iot-based cloud computing: A comprehensive survey
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …
at various locations and are accessible from various industrial environments. Cloud …
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
Blockchain integration for IoT-enabled V2X communications: a comprehensive survey, security issues and challenges
In V2X (vehicle-to-everything) communication, there is a two-way communication among the
vehicle (s) and other Internet of Things (IoT)-enabled smart devices around it that may …
vehicle (s) and other Internet of Things (IoT)-enabled smart devices around it that may …
Social Networking Security during COVID‐19: A Systematic Literature Review
During the Covid‐19 Pandemic, the usage of social media networks increased
exponentially. People engage in education, business, shop**, and other social activities …
exponentially. People engage in education, business, shop**, and other social activities …
[PDF][PDF] Light Weight Circular Error Learning Algorithm (CELA) for Secure Data Communication Protocol in IoT-Cloud Systems
N Mangala, KR Venugopal - International Journal of …, 2023 - pdfs.semanticscholar.org
The data driven smart applications, utilize the IoT, Cloud Computing, AI and other digital
technologies to create, curate and operate on large amounts of data to provide intelligent …
technologies to create, curate and operate on large amounts of data to provide intelligent …
[PDF][PDF] Intelligent transport system using IoT-V2X: communication technologies, security issues, challenges and countermeasures
P Saraswathi, GVS RAJKUMAR, PM Rao - 2022 - scholar.archive.org
Abstract The Internet of Things (IoT) has become an essential part of today's human lives. It
provides various services in various domains such as large-scale industrial systems …
provides various services in various domains such as large-scale industrial systems …
Challenges, Attacks, and Countermeasures for Security in MANETs-IoT
A Priyam, A Yadav - International Conference on Cryptology & Network …, 2023 - Springer
Abstract The integration of Mobile Ad hoc Networks and the Internet of Things offers
innovative applications but also presents significant security challenges. This paper …
innovative applications but also presents significant security challenges. This paper …
An Artificial Intelligence Approach for Malware Detection Using Deep Learning
P Saraswathi, VV Krishna, DV Yashwanth… - … Conference on Data …, 2023 - Springer
Computer users, organizations, and governments are all seeing an exponential
development in the number of malware assaults. When it comes to determining the nature of …
development in the number of malware assaults. When it comes to determining the nature of …
Impacts Of Cyber Security In Iot-Based Cloud Computing
Cloud computing contributes the elastic and extensible architecture in which resources and
data are scattered at different regions and accessible from anywhere. Cloud computing …
data are scattered at different regions and accessible from anywhere. Cloud computing …
An Improved Locality-Sensitive Hashing-Based Recommender Approach in a Distributed Environment
With the rising of the service computing paradigm grows in popularity, huge amounts of
systems and resources are becoming available very quickly on the Web, creating major …
systems and resources are becoming available very quickly on the Web, creating major …