Security analysis of IoT devices by using mobile computing: a systematic literature review
Internet of Things (IoT) devices are operating in various domains like healthcare
environment, smart cities, smart homes, transportation, and smart grid system. These …
environment, smart cities, smart homes, transportation, and smart grid system. These …
Security in Internet of Things: A review
Internet of Things (IoT) is the paramount virtual network that enables remote users to access
connected multimedia devices. It has dragged the attention of the community because it …
connected multimedia devices. It has dragged the attention of the community because it …
A novel data poisoning attack in federated learning based on inverted loss function
Data poisoning attack is one of the common attacks that decreases the performance of a
model in edge machine learning. The mechanism used in most of the existing data …
model in edge machine learning. The mechanism used in most of the existing data …
Classification Techniques for Arrhythmia Patterns Using Convolutional Neural Networks and Internet of Things (IoT) Devices
The rise of Telemedicine has revolutionized how patients are being treated, leading to
several advantages such as enhanced health analysis tools, accessible remote healthcare …
several advantages such as enhanced health analysis tools, accessible remote healthcare …
[HTML][HTML] An analysis of cybersecurity attacks against internet of things and security solutions
MR Islam, KM Aktheruzzaman - Journal of Computer and …, 2020 - scirp.org
Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps
billion of devices to connect to the internet so that they can exchange data with each other …
billion of devices to connect to the internet so that they can exchange data with each other …
IoT security challenges in cloud environment
IoT plays a critical role in every industry, from homes to retail. The internet of things was first
established in 1998, and since then, it has become a term in every profession. Smart …
established in 1998, and since then, it has become a term in every profession. Smart …
Fpga based light weight encryption of medical data for iomt devices using ascon cipher
K Raj, S Bodapati - 2022 IEEE International Symposium on …, 2022 - ieeexplore.ieee.org
Internet of Things applications with various sensors in public network are vulnerable to cyber
physical attacks. The technology of IoT in smart health monitoring systems popularly known …
physical attacks. The technology of IoT in smart health monitoring systems popularly known …
Design and implementation of an IoT-based energy monitoring system for managing smart homes
MO Agyeman, Z Al-Waisi… - 2019 Fourth International …, 2019 - ieeexplore.ieee.org
The usage of smart meters has been expanding rapidly since the 2000s, as they provide
economic, social and environmental benefits for multiple stakeholders. A smart meter can …
economic, social and environmental benefits for multiple stakeholders. A smart meter can …
Improved Generic Layer Model for IoT Architecture.
P Pukkasenung… - Journal of Information …, 2021 - search.ebscohost.com
The internet of things (IoT) has the potential to create massive disruptions in
telecommunications, cable broadband, cloud computing, and the architecture of related IoT …
telecommunications, cable broadband, cloud computing, and the architecture of related IoT …
A low-cost secure IoT mechanism for monitoring and controlling polygeneration microgrids
The use of Internet-connected devices at homes has increased to monitor energy
consumption. Furthermore, renewable energy sources have also increased, reducing …
consumption. Furthermore, renewable energy sources have also increased, reducing …