High-Speed Network DDoS Attack Detection: A Survey
Having a large number of device connections provides attackers with multiple ways to attack
a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can …
a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can …
Blockchain applications and architectures for port operations and logistics management
Efficient port logistic operations and management are critical for global trade and
transportation services. The current port logistic handling systems are highly centralized and …
transportation services. The current port logistic handling systems are highly centralized and …
Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-
19 pandemic is no exception. For example, social distancing measures have resulted in …
19 pandemic is no exception. For example, social distancing measures have resulted in …
A blockchain-based IoT-enabled E-Waste tracking and tracing system for smart cities
Recycling of electronic waste is a rapidly growing global issue that requires proper
monitoring and tracing of electronic devices and the business transactions between the …
monitoring and tracing of electronic devices and the business transactions between the …
CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things …
Abstract Internet of Things (IoT) fostered a new epoch of innovation by interconnecting
digital devices to make human life more convenient and attractive. These smart objects are …
digital devices to make human life more convenient and attractive. These smart objects are …
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …
Blockchain‐Based IoT‐Enabled System for Secure and Efficient Logistics Management in the Era of IR 4.0
NA Ugochukwu, SB Goyal… - Journal of …, 2022 - Wiley Online Library
As the global logistics business expands as a result of the industrial 4.0 revolution, logistics
operations continue to evolve as new technologies such as IoT, cloud, and big data are …
operations continue to evolve as new technologies such as IoT, cloud, and big data are …
An authentication protocol for next generation of constrained Iot systems
S Rostampour, N Bagheri, Y Bendavid… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
With the exponential growth of connected Internet of Things (IoT) devices around the world,
security protection and privacy preservation have risen to the forefront of design and …
security protection and privacy preservation have risen to the forefront of design and …
A post-quantum compliant authentication scheme for IoT healthcare systems
In an Internet of Things (IoT)-based healthcare system, medical IoT devices gather and
transmit critical patient data. Ensuring the security and privacy of medical data is paramount …
transmit critical patient data. Ensuring the security and privacy of medical data is paramount …
A lightweight cyber security framework with context-awareness for pervasive computing environments
Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive
computing over the IoT platform makes life more convenient by embedding sensors based …
computing over the IoT platform makes life more convenient by embedding sensors based …