A comprehensive survey of blockchain-powered cybersecurity-a survey
R Salama, F Al-Turjman, C Altrjman… - 2023 International …, 2023 - ieeexplore.ieee.org
Text mining was used to examine the academic publications on blockchain technology and
cybersecurity that were published in huge digital libraries. Automated text mining methods …
cybersecurity that were published in huge digital libraries. Automated text mining methods …
A Systematic Review on Blockchain-enabled Internet of Vehicles (BIoV): Challenges, Defences and Future Research Directions
In the field of vehicular communication, the Internet of Vehicles (IoV) serves as a new era
that guarantees increased connectivity, efficiency, and safety. The modern area and new …
that guarantees increased connectivity, efficiency, and safety. The modern area and new …
[HTML][HTML] An advanced internet-of-drones system with blockchain for improving quality of service of search and rescue: A feasibility study
Drone-based systems supporting Search and Rescue (SAR) missions help expeditiously
improve the possibility of discovering the missing victims. Nonetheless, the current drone …
improve the possibility of discovering the missing victims. Nonetheless, the current drone …
Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review
The proliferation of resource-constrained devices has become prevalent across various
digital applications, including smart homes, smart healthcare, and smart transportation …
digital applications, including smart homes, smart healthcare, and smart transportation …
SWAF: a smart web application firewall based on convolutional neural network
Internet network carries a huge stream of HTTP requests and responses between users and
servers. Securing server data access is primordial for internet users to enhance confidence …
servers. Securing server data access is primordial for internet users to enhance confidence …
Blockchain for IoT-Based Healthcare using secure and privacy-preserving watermark
Patient medical data is the key data of an e-health application. Medical data frequently play
an important role in disease analysis and are implicated in motivating values for educating …
an important role in disease analysis and are implicated in motivating values for educating …
Intrusion detection system for IoMT through blockchain-based federated learning
B Zaabar, O Cheikhrouhou… - 2022 15th International …, 2022 - ieeexplore.ieee.org
Federated Learning (FL) is a feasible technology to collaboratively train a model without
sharing private data. This approach differs from traditional machine learning techniques …
sharing private data. This approach differs from traditional machine learning techniques …
Review and comparison of US, EU, and UK regulations on cyber risk/security of the current blockchain technologies: Viewpoint from 2023
P Radanliev - The Review of Socionetwork Strategies, 2023 - Springer
The first cryptocurrency was invented in 2008/09, but the Blockchain-Web3 concept is still in
its infancy, and the cyber risk is constantly changing. Cybersecurity should also be adapting …
its infancy, and the cyber risk is constantly changing. Cybersecurity should also be adapting …
A blockchain protocol for real-time application migration on the edge
The Internet of Things (IoT) is experiencing widespread adoption across industry sectors
ranging from supply chain management to smart cities, buildings, and health monitoring …
ranging from supply chain management to smart cities, buildings, and health monitoring …
IoT DOS and DDOS Attacks Detection Using an Effective Convolutional Neural Network
The rapid proliferation of the Internet of Things (IoT) has led to the interconnection of billions
of intelligent sensors. However, this interconnection has also introduced significant security …
of intelligent sensors. However, this interconnection has also introduced significant security …