Systematic review of authentication and authorization advancements for the Internet of Things

M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny - Sensors, 2022 - mdpi.com
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate
their direction, leaving space for a plethora of research directions and opportunities. Among …

Detection of distributed denial of service (DDoS) attacks in IOT based monitoring system of banking sector using machine learning models

U Islam, A Muhammad, R Mansoor, MS Hossain… - Sustainability, 2022 - mdpi.com
Cyberattacks can trigger power outages, military equipment problems, and breaches of
confidential information, ie, medical records could be stolen if they get into the wrong hands …

Advances on networked ehealth information access and sharing: Status, challenges and prospects

VJ Aski, VS Dhaka, S Kumar, S Verma, DB Rawat - Computer networks, 2022 - Elsevier
Abstarct Internet of Medical Things (IoMT) is no longer a futuristic technology and has
become a day-to-day reality with the increasing ease of availing modern internet services …

Cyber attacks detection through machine learning in banking

MA GILL, N AHMAD, M KHAN, F ASGHAR… - Bulletin of Business …, 2023 - bbejournal.com
Cyberattacks may cause a wide range of problems, from power outages to broken military
equipment to the loss of vital information like patient medical records. Due to the huge …

Secure ownership management and transfer of consumer internet of things devices with self-sovereign identity

N Sakib, MY Ali, NM Momo, MI Mumu… - arxiv preprint arxiv …, 2024 - arxiv.org
The popularity of the Internet of Things (IoT) has driven its usage in our homes and
industries over the past 10-12 years. However, there have been some major issues related …

A Systematic Analysis of Machine Learning Algorithms for Cloud DDoS Attack Detection

A Mehta, S Badotra, G Singh… - 2023 10th IEEE Uttar …, 2023 - ieeexplore.ieee.org
Computing in the cloud is a relatively recent innovation that involves sending data
processing jobs to third-party service providers through the Internet. Cloud computing comes …