[HTML][HTML] A deeper look into cybersecurity issues in the wake of Covid-19: A survey
This study analyzed the Coronavirus (COVID-19) crisis from the angle of cyber-crime,
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …
highlighting the wide spectrum of cyberattacks that occurred around the world. The modus …
The internet of things security: A survey encompassing unexplored areas and new insights
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …
life undertakings, mandates continuous research pursuits in IoT and its associated …
IoT adoption and application for smart healthcare: a systematic review
M Al-Rawashdeh, P Keikhosrokiani, B Belaton… - Sensors, 2022 - mdpi.com
In general, the adoption of IoT applications among end users in healthcare is very low.
Healthcare professionals present major challenges to the successful implementation of IoT …
Healthcare professionals present major challenges to the successful implementation of IoT …
A new ensemble-based intrusion detection system for internet of things
The domain of Internet of Things (IoT) has witnessed immense adaptability over the last few
years by drastically transforming human lives to automate their ordinary daily tasks. This is …
years by drastically transforming human lives to automate their ordinary daily tasks. This is …
Cloud computing forensics; challenges and future perspectives: A review
B Cinar, JP Bharadiya - Asian Journal of Research in …, 2023 - research.send4journal.com
Cloud computing has become increasingly popular in recent years, evolving into a
computing paradigm that is both cost-effective and efficient. It has the potential to be one of …
computing paradigm that is both cost-effective and efficient. It has the potential to be one of …
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities
Specialized data preparation techniques, ranging from data cleaning, outlier detection,
missing value imputation, feature selection (FS), amongst others, are procedures required to …
missing value imputation, feature selection (FS), amongst others, are procedures required to …
[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
Review of telecommunication regulation and policy: comparative analysis USA and Africa
CA Ezeigweneme, AA Umoh, VI Ilojianya… - Computer Science & IT …, 2024 - fepbl.com
This paper presents a comprehensive comparative analysis of telecommunication regulation
and policy frameworks in the United States (USA) and various African countries …
and policy frameworks in the United States (USA) and various African countries …
Cryptography algorithms for enhancing IoT security
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …
(IoT) is advancing every business. It provides communication between the digital and …