Cybersecurity in the internet of things in industrial management
RJ Raimundo, AT Rosário - Applied Sciences, 2022 - mdpi.com
Nowadays, people live amidst the smart home domain, while there are business
opportunities in industrial smart cities and healthcare. However, there are concerns about …
opportunities in industrial smart cities and healthcare. However, there are concerns about …
Cybersecurity and cyber forensics for smart cities: A comprehensive literature review and survey
Smart technologies, such as the Internet of Things (IoT), cloud computing, and artificial
intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart …
intelligence (AI), are being adopted in cities and transforming them into smart cities. In smart …
[HTML][HTML] Smart home anomaly-based IDS: Architecture proposal and case study
The complexity and diversity of the technologies involved in the Internet of Things (IoT)
challenge the generalization of security solutions based on anomaly detection, which should …
challenge the generalization of security solutions based on anomaly detection, which should …
A deep learning approach for classifying network connected IoT devices using communication traffic characteristics
Abstract The Internet of Things can be considered a technological revolution and has
successfully merged the physical world with the digital world. However, heterogeneous IoT …
successfully merged the physical world with the digital world. However, heterogeneous IoT …
A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks
The integration of the Internet of Things (IoT) and artificial intelligence (AI) in urban
infrastructure, powered by advanced information communication technologies (ICT), has …
infrastructure, powered by advanced information communication technologies (ICT), has …
IOT-based service migration for connected communities
Due to the nature of mobile systems in which devices change their locations continuously,
there is a need for efficient techniques to integrate responses from different agents. Such …
there is a need for efficient techniques to integrate responses from different agents. Such …
Privacy-preservation techniques for IoT devices: a systematic map** study
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
Smart Cities: Emerging technologies and Potential solutions to the Cyber security threads
Smart city development with proper use of emerging technologies greatly reduces security
issues, reduces energy waste, saves time, and increases human safety in urban areas …
issues, reduces energy waste, saves time, and increases human safety in urban areas …
[HTML][HTML] A lightweight and secure authentication protocol for visually impaired and handicapped people in the telehealth system
F Algarni - Alexandria Engineering Journal, 2024 - Elsevier
Sensors and wearable technology are used to accumulate health-related data from the
visually impaired (VI) and other special persons. This health-related data is disseminated via …
visually impaired (VI) and other special persons. This health-related data is disseminated via …
A novel feature-selection method for human activity recognition in videos
Human Activity Recognition (HAR) is the process of identifying human actions in a specific
environment. Recognizing human activities from video streams is a challenging task due to …
environment. Recognizing human activities from video streams is a challenging task due to …