Cybersecurity in the internet of things in industrial management

RJ Raimundo, AT Rosário - Applied Sciences, 2022 - mdpi.com
Nowadays, people live amidst the smart home domain, while there are business
opportunities in industrial smart cities and healthcare. However, there are concerns about …

Cybersecurity and cyber forensics for smart cities: A comprehensive literature review and survey

K Kim, IM Alshenaifi, S Ramachandran, J Kim, T Zia… - Sensors, 2023 - mdpi.com
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial
intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart …

[HTML][HTML] Smart home anomaly-based IDS: Architecture proposal and case study

A Lara, V Mayor, R Estepa, A Estepa, JE Díaz-Verdejo - Internet of Things, 2023 - Elsevier
The complexity and diversity of the technologies involved in the Internet of Things (IoT)
challenge the generalization of security solutions based on anomaly detection, which should …

A deep learning approach for classifying network connected IoT devices using communication traffic characteristics

RR Chowdhury, AC Idris, PE Abas - Journal of Network and Systems …, 2023 - Springer
Abstract The Internet of Things can be considered a technological revolution and has
successfully merged the physical world with the digital world. However, heterogeneous IoT …

A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks

J Ali, SK Singh, W Jiang, AM Alenezi, M Islam… - Computer …, 2025 - Elsevier
The integration of the Internet of Things (IoT) and artificial intelligence (AI) in urban
infrastructure, powered by advanced information communication technologies (ICT), has …

IOT-based service migration for connected communities

M Rawashdeh, MGH Al Zamil, SM Samarah… - Computers & Electrical …, 2021 - Elsevier
Due to the nature of mobile systems in which devices change their locations continuously,
there is a need for efficient techniques to integrate responses from different agents. Such …

Privacy-preservation techniques for IoT devices: a systematic map** study

D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …

Smart Cities: Emerging technologies and Potential solutions to the Cyber security threads

ACM Nafrees, AMA Sujah… - 2021 5th International …, 2021 - ieeexplore.ieee.org
Smart city development with proper use of emerging technologies greatly reduces security
issues, reduces energy waste, saves time, and increases human safety in urban areas …

[HTML][HTML] A lightweight and secure authentication protocol for visually impaired and handicapped people in the telehealth system

F Algarni - Alexandria Engineering Journal, 2024 - Elsevier
Sensors and wearable technology are used to accumulate health-related data from the
visually impaired (VI) and other special persons. This health-related data is disseminated via …

A novel feature-selection method for human activity recognition in videos

N Tweit, MA Obaidat, M Rawashdeh, AK Bsoul… - Electronics, 2022 - mdpi.com
Human Activity Recognition (HAR) is the process of identifying human actions in a specific
environment. Recognizing human activities from video streams is a challenging task due to …