Federated learning meets blockchain in edge computing: Opportunities and challenges

DC Nguyen, M Ding, QV Pham… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Mobile-edge computing (MEC) has been envisioned as a promising paradigm to handle the
massive volume of data generated from ubiquitous mobile devices for enabling intelligent …

[HTML][HTML] Internet of things and ransomware: Evolution, mitigation and prevention

M Humayun, NZ Jhanjhi, A Alsayat… - Egyptian Informatics …, 2021 - Elsevier
Internet of things architecture is the integration of real-world objects and places with the
internet. This booming in technology is bringing ease in our lifestyle and making formerly …

5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions

M Adil, H Song, MK Khan, A Farouk, Z ** - Journal of Network and …, 2024 - Elsevier
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …

[HTML][HTML] Early detection of crypto-ransomware using pre-encryption detection algorithm

SH Kok, A Abdullah, NZ Jhanjhi - … of King Saud University-Computer and …, 2022 - Elsevier
Crypto ransomware is a type of malware that locks its victim's file for ransom using an
encryption algorithm. Its popularity has risen at an alarming rate among the cyber security …

Cyber threats classifications and countermeasures in banking and financial sector

AA Darem, AA Alhashmi, TM Alkhaldi… - IEEe …, 2023 - ieeexplore.ieee.org
The banking and financial sector has always been a prime target for cyber threats due to the
critical nature of the information they handle. With the increasing dependence on technology …

Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model

S Amanlou, MK Hasan, KAA Bakar - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …

Analysis of security issues and countermeasures for the industrial internet of things

S Pal, Z Jadidi - Applied Sciences, 2021 - mdpi.com
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT)
services and applications to industry with the inclusion of Industry 4.0 that provides …

Detection of fake accounts on social media using multimodal data with deep learning

B Goyal, NS Gill, P Gulia, O Prakash… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
In recent years, the proliferation of fake accounts on social media has become a significant
concern for individuals, organizations, and society. Fake accounts play an important role in …

Dimensions of internet of things: Technological taxonomy architecture applications and open challenges—a systematic review

K Kumar, A Kumar, N Kumar… - Wireless …, 2022 - Wiley Online Library
We are traversing the growing emerging technology paradigms in today's advanced
technological world. In this present era, the Internet of Things (IoT) is extensively used in all …

Analysis of the cryptographic algorithms in IoT communications

C Silva, VA Cunha, JP Barraca, RL Aguiar - Information Systems Frontiers, 2024 - Springer
The advances on recent communication paradigms brings new security and privacy
challenges, mainly about personal data collection by smart devices. Resource constrained …