Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022‏ - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …

IoT malware: An attribute-based taxonomy, detection mechanisms and challenges

P Victor, AH Lashkari, R Lu, T Sasi, P **ong… - Peer-to-peer Networking …, 2023‏ - Springer
During the past decade, the Internet of Things (IoT) has paved the way for the ongoing
digitization of society in unique ways. Its penetration into enterprise and day-to-day lives …

Survey: Self-empowered wireless sensor networks security taxonomy, challenges, and future research directions

M Adil, VG Menon, V Balasubramanian… - IEEE Sensors …, 2022‏ - ieeexplore.ieee.org
In the recent past, patient-wearable devices and implantable biosensors revealed
exponential growth in digital healthcare, because they have the capability to allow access to …

SNDMI: Spyware network traffic detection method based on inducement operations

J Peng, C Guo, Y **, Y Cui, Y Chen, G Shen - Computers & Security, 2024‏ - Elsevier
Spyware is a type of malware widely used by attackers to steal confidential information from
users without their knowledge. It has the characteristics of high latency, high stealth, and …

Data protection and security enhancement in cyber-physical systems using AI and blockchain

K Vignesh Saravanan, P Jothi Thilaga… - AI models for blockchain …, 2023‏ - Springer
Cyber-Physical systems termed as CPS is a system which is an incorporation of both
computational algorithms and physical components. Several applications such as smart …

Comprehensive analysis of iot malware evasion techniques

A Al-Marghilani - Engineering, Technology & Applied Science Research, 2021‏ - etasr.com
Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices
lack certain characteristics such as homogeneity and security. Malware is malicious software …

Erudite: Human-in-the-loop iot for an adaptive personalized learning system

M Taherisadr, MA Al Faruque… - IEEE Internet of Things …, 2023‏ - ieeexplore.ieee.org
Thanks to the rapid growth in wearable technologies and advancements in machine
learning, monitoring complex human contexts becomes feasible, paving the way to develop …

adaparl: Adaptive privacy-aware reinforcement learning for sequential decision making human-in-the-loop systems

M Taherisadr, SA Stavroulakis, S Elmalaki - Proceedings of the 8th ACM …, 2023‏ - dl.acm.org
Reinforcement learning (RL) presents numerous benefits compared to rule-based
approaches in various applications. Privacy concerns have grown with the widespread use …

Spyware identification for android systems using fine trees

M Naser, Q Abu Al-Haija - Information, 2023‏ - mdpi.com
Android operating system (OS) has been recently featured as the most commonly used and
ingratiated OS for smartphone ecosystems. This is due to its high interoperability as an open …

Holistic Survey on Security in IoT Application Layer: Attacks, Protocols, and Applications

NS Kumari, HS Vimala, CN Pruthvi, J Shreyas - IEEE Access, 2024‏ - ieeexplore.ieee.org
Context: The growing number of linked devices, the limitations of some IoT devices, worries
about data privacy, risks to physical safety, and the ever-changing threats all highlight why …