Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security

E Hashmi, MM Yamin, SY Yayilgan - AI and Ethics, 2024 - Springer
This survey paper explores the transformative role of Artificial Intelligence (AI) in information
security. Traditional methods, especially rule-based approaches, faced significant …

[HTML][HTML] The personal health applications of machine learning techniques in the internet of behaviors

Z Amiri, A Heidari, M Darbandi, Y Yazdani… - Sustainability, 2023 - mdpi.com
With the swift pace of the development of artificial intelligence (AI) in diverse spheres, the
medical and healthcare fields are utilizing machine learning (ML) methodologies in …

Safeguarding Individuals and Organisations from Privacy Breaches: A Comprehensive Review of Problem Domains, Solution Strategies, and Prospective Research …

ASM Kayes, W Rahayu, T Dillon… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Privacy breaches have become increasingly prevalent, exposing individuals to significant
risks. These breaches can have far-reaching consequences, including identity theft and life …

Development of a smart tourism service system based on the Internet of Things and machine learning

H Ma - The Journal of Supercomputing, 2024 - Springer
While traveling, people need to utilize smart tourism service systems based on the Internet of
Things (IoT) to enhance their journeys' convenience. However, existing IoT-based smart …

Mitigating denial of service attacks in RPL-based IoT environments: trust-based approach

F Azzedin - IEEE Access, 2023 - ieeexplore.ieee.org
In domains such as telehealth, intelligent transportation, and autonomous agriculture,
ensuring secure routing of collected and exchanged data is paramount. Since its inception …

Leveraging NLP techniques for privacy requirements engineering in user stories

GB Herwanto, G Quirchmayr, AM Tjoa - IEEE Access, 2024 - ieeexplore.ieee.org
Privacy requirements engineering acts as a role to systematically elicit privacy requirements
from system requirements and legal requirements such as the GDPR. Many methodologies …

Swarmtrust: A swarm optimization-based approach to enhance trustworthiness in smart homes

IU Din, KA Awan, A Almogren, JJPC Rodrigues - Physical Communication, 2023 - Elsevier
As smart home networks become increasingly complex and dynamic, maintaining trust
between the various devices and services is crucial. Existing trust management approaches …

Current applications and challenges of the Internet of Things

R Dallaev, T Pisarenko, Ş Ţălu… - New Trends in …, 2023 - journals.vilniustech.lt
The concept of the Internet of Things is capable of making a giant leap in the economy,
including research in the field of computer science, network technologies, microelectronics …

Towards a Holistic Privacy Requirements Engineering Process: Insights from a Systematic Literature Review

GB Herwanto, FJ Ekaputra, G Quirchmayr… - IEEE Access, 2024 - ieeexplore.ieee.org
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to
integrate privacy principles into organizational and technical processes throughout the …

Protecting data and privacy: cloud-based solutions for intelligent transportation applications

S Singha, R Singha - Scalable computing: practice and experience, 2023 - scpe.org
The interaction between transportation networks and intelligent transportation systems has
been revolutionized by cloud computing. However, the reliance on cloud-based solutions …