Internet of things (iot): Origin, embedded technologies, smart applications and its growth in the last decade

JS Yalli, MH Hasan, A Badawi - IEEE access, 2024 - ieeexplore.ieee.org
The idea of the IoT began back in 1982 when a vending machine was connected to the
internet, then to the concept of Mark Weiser in 1992, then RFID, and so on. A detailed …

Internet of Things (IoT) networks: A systematic review and security assessment of authentication schemes

JS Yalli, MH Hasan, LT Jung, SM Al-Selwi - Internet of Things, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are revolutionizing various aspects of our lives by
enabling intelligent and automated systems. However, the proliferation of IoT devices also …

A Systematic Review For Evaluating IoT Security: A Focus On Authentication, Protocols and Enabling Technologies

JS Yalli, MH Hasan, LT Jung, AI Yerima… - IEEE Internet of …, 2025 - ieeexplore.ieee.org
The idea of the Internet of Things (IoT) is to connect objects and smart devices with any
digital element seamlessly at any time, anywhere, with anything. These devices or objects …

Pre-Encryption Ransomware Detection (PERD) Taxonomy, and Research Directions: Systematic Literature Review.

MF Hassan, R Akbar, R Ullah… - International …, 2024 - search.ebscohost.com
Today's era is witnessing an alarming surge in ransomware attacks, propelled by the
increasingly sophisticated obfuscation tools deployed by cybercriminals to evade …

Comprehensive Review of Security Requirements for Mitigating Threats and Attacks on IoT Assets

AA Janisar, KS bin Kalid, AB Sarlan, MA Iqbal… - … : International Journal on …, 2024 - joiv.org
Abstract Machine learning and artificial intelligence are increasingly being utilized to
automate identifying and defining security requirements (SR) and addressing diverse IoT …

Internet of Things (IoT): Trends, Challenges, Simulators, Emulators and Test-beds

JS Yalli, MH Hasan, A Al-Qushaibi… - 2024 8th …, 2024 - ieeexplore.ieee.org
During the past few years, the deployment and adoption of IoT in the world have increased
significantly. The growth rate of IoT increases annually. Researchers today rate the security …

[PDF][PDF] Research of the V2X Technology Organization Model for Self-Managed Technical Equipment

A Gubaidullin, O Manankova - technology, 2024 - saiconferences.com
The steady progression of information technology today is opening up opportunities for
extensive automation across various sectors, including the automotive industry. The active …

Pre-Encryption Ransomware Detection (PERD) Taxonomy, and Research Directions: Systematic

R Ullah, KS Savita, U Rehman, JS Yalli - search.proquest.com
Today's era is witnessing an alarming surge in ransomware attacks, propelled by the
increasingly sophisticated obfuscation tools deployed by cybercriminals to evade …

[PDF][PDF] International Journal of Technical Innovation in Modern Engineering & Science (IJTIMES)

HR Vaghela, AA Amin, PN Patel - TRAFFIC, 2018 - researchgate.net
The urban road network in Ahmedabad is 2600 km and it is mostly improbable to grow in
near future, but the numbers of vehicle registration have enlarged by 24.59 Lakhs in last …

[PDF][PDF] Internet of Things

H Malik, T Anees, M Faheem, MU Chaudhry, A Ali… - core.ac.uk
Blockchain-based drug supply management (DSM) requires powerful security and privacy
procedures for high-level authentication, interoperability, and medical record sharing …