Cloud security threats and solutions: A survey
Cloud computing is the on-demand availability of PC framework resources. Especially
information storage and handling power, without direct unique administration by the …
information storage and handling power, without direct unique administration by the …
AI-Driven urban energy solutions—from individuals to society: a review
This paper provides a comprehensive review of solutions based on artificial intelligence (AI)
in the urban energy sector, with a focus on their applications and impacts. The study …
in the urban energy sector, with a focus on their applications and impacts. The study …
Internet of Things (IoT): From awareness to continued use
This paper proposes a research model with five constructs, ie, IoT awareness, users' IoT
privacy knowledge, users' IoT security knowledge, users' IoT Trust, and continued intention …
privacy knowledge, users' IoT security knowledge, users' IoT Trust, and continued intention …
Usage and impact of the internet-of-things-based smart home technology: a quality-of-life perspective
The aim of this paper is to explore the usage and impact of the Internet-of-Things-based
Smart Home Technology (IoT-SHT) in Malaysia. Face-to-face interviews were conducted …
Smart Home Technology (IoT-SHT) in Malaysia. Face-to-face interviews were conducted …
A hybrid approach for alluring ads phishing attack detection using machine learning
Phishing attacks are evolving with more sophisticated techniques, posing significant threats.
Considering the potential of machine-learning-based approaches, our research presents a …
Considering the potential of machine-learning-based approaches, our research presents a …
FMDADM: A multi-layer DDoS attack detection and mitigation framework using machine learning for stateful SDN-based IoT networks
The absence of standards and the diverse nature of the Internet of Things (IoT) have made
security and privacy concerns more acute. Attacks such as distributed denial of service …
security and privacy concerns more acute. Attacks such as distributed denial of service …
Ultra‐reliability and low‐latency communications on the internet of things based on 5G network: Literature review, classification, and future research view
A new technology known as the Internet of Things (IoT) uses several sensor devices and
communication protocols. By implementing cutting‐edge and modern equipment, people …
communication protocols. By implementing cutting‐edge and modern equipment, people …
[HTML][HTML] Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Abstract The Internet of Things (IoT) technologies continuously expand with time due to the
advances in automated, connected device technology, mobility, and wide access to …
advances in automated, connected device technology, mobility, and wide access to …
Evaluation of security metrics in AIoT and blockchain-based supply chain by Neutrosophic decision-making method
Today, smart supply chains are one of the main and growing applications of evolving
technologies such as the Internet of Things (IoT), artificial intelligence (AI), and blockchain …
technologies such as the Internet of Things (IoT), artificial intelligence (AI), and blockchain …
[HTML][HTML] Review of Smart-Home Security Using the Internet of Things
As the Internet of Things (IoT) continues to revolutionize the way we interact with our living
spaces, the concept of smart homes has become increasingly prevalent. However, along …
spaces, the concept of smart homes has become increasingly prevalent. However, along …