Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey
The Internet of Things (IoT) has revolutionized various domains, enabling interconnected
devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in …
devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in …
A lightweight optimized intrusion detection system using machine learning for edge-based IIoT security
Abstract The Industrial Internet of Things (IIoT) attributes to intelligent sensors and actuators
for better manufacturing and industrial operations. At the same time, IIoT devices must be …
for better manufacturing and industrial operations. At the same time, IIoT devices must be …
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
As reliance on digital services grows, traditional password-based authentication methods
have been increasingly scrutinized due to their susceptibility to cyber-attacks, including …
have been increasingly scrutinized due to their susceptibility to cyber-attacks, including …
Adopting artificial intelligence in ITIL for information security management—way forward in industry 4.0
M Rajagopal, S Ramkumar - Artificial Intelligence and Cyber Security in …, 2023 - Springer
To help prevent, detect, and resolve security-related problems within a company, AI must be
deployed. Industry 4.0 hopes to significantly improve information security by bringing forth …
deployed. Industry 4.0 hopes to significantly improve information security by bringing forth …
Saila: Human Interface Device (HID) Injection Protection with Smart Phone based Passwordless Security
The necessity for data protection is growing rapidly due to the increase in different kinds of
attacks on information security systems. Standard computers and data processing machines …
attacks on information security systems. Standard computers and data processing machines …
TUSH-Key: Transferable User Secrets on Hardware Key
Passwordless authentication was first tested for seamless and secure merchant payments
without the use of passwords or pins. It opened a whole new world of authentications giving …
without the use of passwords or pins. It opened a whole new world of authentications giving …
TUSH-Key: Transferable User Secrets on Hardware Key
Passwordless authentication has revolutionized secure merchant payments, discarding
reliance on passwords and PINs. Utilizing W3C Web Authentication (WebAuthn) and Client …
reliance on passwords and PINs. Utilizing W3C Web Authentication (WebAuthn) and Client …
Harmonizing Private Key Security and Ethereum Account System Flexibility: A FIDO2 and AA-Based Cryptocurrency Wallet
D Jung, B Kim, J Lee - Journal of the Korea Institute of Information …, 2024 - koreascience.kr
This study proposes a novel model to address the security, usability, and scalability
challenges of cryptocurrency wallets. The model is implemented as a web application that …
challenges of cryptocurrency wallets. The model is implemented as a web application that …
Sistem Keamanan Kotak Paket Cerdas Berbasis IoT dengan Teknologi MQTT
MQTT protocol is used by smart package box security systems based on the Internet of
Things (IoT) to ensure the security and speed of package delivery. This system uses ESP32 …
Things (IoT) to ensure the security and speed of package delivery. This system uses ESP32 …