Exploring authentication paradigms in the internet of things: A comprehensive sco** review

NH Kamarudin, NHS Suhaimi, FA Nor Rashid… - Symmetry, 2024 - mdpi.com
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation
of robust security measures such as authentication has become paramount to safeguarding …

Designing an Authentication Methodology in IoT Using Energy Consumption Patterns

EM Timofte, AL Balan, T Iftime - 2024 International Conference …, 2024 - ieeexplore.ieee.org
In this paper we are proposing an authentication method based on the energy usage
patterns of connected devices. This approach marks a step up from traditional security …

DDoS and Botnet Attacks: A Survey of Detection and Prevention Techniques

SA Pranav, B HariHaran - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) heralds a innovative generation in communication via enabling
regular gadgets to supply, receive, and percentage records easily. IoT applications, which …

Detecting anomalies in IoT sensor data using machine learning algorithms

V Mehta, S Sharma, G Abirami - Challenges in Information …, 2025 - taylorfrancis.com
In today's interconnected world, the integration of Internet of Things (IoT) devices into
networks has become increasingly prevalent. This extensive connectivity has raised …

Evaluating the Efficiency of Models for Predicting Seismic Building Damage

CS Hwa, Y Lim - The Transactions of the Korea Information …, 2024 - koreascience.kr
Predicting earthquake occurrences accurately is challenging, and preparing all buildings
with seismic design for such random events is a difficult task. Analyzing building features to …