AI-empowered fog/edge resource management for IoT applications: A comprehensive review, research challenges and future perspectives
The proliferation of ubiquitous Internet of Things (IoT) sensors and smart devices in several
domains embracing healthcare, Industry 4.0, transportation and agriculture are giving rise to …
domains embracing healthcare, Industry 4.0, transportation and agriculture are giving rise to …
Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends
The emergence of smart cities and sustainable development has become a globally
accepted form of urbanization. The epitome of smart city development has become possible …
accepted form of urbanization. The epitome of smart city development has become possible …
Experts and intelligent systems for smart homes' Transformation to Sustainable Smart Cities: A comprehensive review
In this constantly evolving landscape of urbanization, the relationship between technology
and automation, in regards to sustainability, holds immense significance. The intricate …
and automation, in regards to sustainability, holds immense significance. The intricate …
A review of security standards and frameworks for IoT-based smart environments
Assessing the security of IoT-based smart environments such as smart homes and smart
cities is becoming fundamentally essential to implementing the correct control measures and …
cities is becoming fundamentally essential to implementing the correct control measures and …
“Baby, you can drive my car”: Psychological antecedents that drive consumers' adoption of AI-powered autonomous vehicles
Artificial intelligence (AI)-powered autonomous vehicles (AVs) are one of the most highly
anticipated technological advancements of our time, with potentially wide-ranging social …
anticipated technological advancements of our time, with potentially wide-ranging social …
Distributed denial of service attacks and its defenses in IoT: a survey
A distributed denial of service (DDoS) attack is an attempt to partially or completely shut
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …
down the targeted server with a flood of internet traffic. The primary aim of this attack is to …
Retracted article: maintaining security and privacy in health care system using learning based deep-Q-networks
P Mohamed Shakeel, S Baskar… - Journal of medical …, 2018 - Springer
In the recent past, Internet of Things (IoT) plays a significant role in different applications
such as health care, industrial sector, defense and research etc.… It provides effective …
such as health care, industrial sector, defense and research etc.… It provides effective …
A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …
A review on smart home present state and challenges: linked to context-awareness internet of things (IoT)
The smart home is considered as an essential domain in Internet of Things (IoT)
applications, it is an interconnected home where all types of things interact with each other …
applications, it is an interconnected home where all types of things interact with each other …
New enhanced authentication protocol for internet of things
Internet of Things (IoT) refers to a new extended network that enables to any object to be
linked to the Internet in order to exchange data and to be controlled remotely. Nowadays …
linked to the Internet in order to exchange data and to be controlled remotely. Nowadays …