-
1
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
Published 2023-12-01Subjects: “…Blockchain, BFlow, Chaskey, Healthcare, IoT, Security…”
Get full text
Article -
2
Securing Cloud-Based Internet of Things: Challenges and Mitigations
Published 2024-12-01Subjects: Get full text
Article -
3
Quantum Privacy-Preserving Range Query Protocol for Encrypted Data in IoT Environments
Published 2024-11-01Subjects: Get full text
Article -
4
A Federated Learning Model for Detecting Cyberattacks in Internet of Medical Things Networks
Published 2025-01-01Subjects: “…IoMT security…”
Get full text
Article -
5
Research on intrusion detection method for edge networks based on federated reinforcement learning
Published 2024-12-01Subjects: Get full text
Article -
6
Optimizing IoT intrusion detection with cosine similarity based dataset balancing and hybrid deep learning
Published 2025-08-01Subjects: Get full text
Article -
7
Hybrid Model for Novel Attack Detection Using a Cluster-Based Machine Learning Classification Approach for the Internet of Things (IoT)
Published 2025-05-01Subjects: “…IoT security…”
Get full text
Article -
8
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01Subjects: Get full text
Article -
9
Vulnerability and Attack Repository for IoT: Addressing Challenges and Opportunities in Internet of Things Vulnerability Databases
Published 2024-11-01Subjects: Get full text
Article -
10
MVTC-Sec: Lightweight Timestamp Correlation for Securing RPL Against DIO Replay Attacks
Published 2025-01-01Subjects: “…IoT security…”
Get full text
Article -
11
-
12
IoTBystander: A Non-Intrusive Dual-Channel-Based Smart Home Security Monitoring Framework
Published 2025-04-01Subjects: “…IoT security…”
Get full text
Article -
13
Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection
Published 2024-11-01Subjects: “…IoT security…”
Get full text
Article -
14
Exploring IoT and Blockchain: A Comprehensive Survey on Security, Integration Strategies, Applications and Future Research Directions
Published 2024-11-01Subjects: Get full text
Article -
15
Research on side-channel attacks and defense methods for IoT devices
Published 2025-02-01Subjects: “…IoT security…”
Get full text
Article -
16
Secret Key Generation Driven by Attention-Based Convolutional Autoencoder and Quantile Quantization for IoT Security in 5G and Beyond
Published 2025-01-01Subjects: Get full text
Article -
17
Deep Ensemble Learning With Pruning for DDoS Attack Detection in IoT Networks
Published 2024-01-01Subjects: Get full text
Article -
18
Research on Intrusion Detection Method Based on Transformer and CNN-BiLSTM in Internet of Things
Published 2025-04-01Subjects: “…IoT security…”
Get full text
Article -
19
Energy Consumption Analysis of ISO/IEC 29192-2 Standard Lightweight Ciphers
Published 2025-04-01Subjects: Get full text
Article -
20
Securing the 6G–IoT Environment: A Framework for Enhancing Transparency in Artificial Intelligence Decision-Making Through Explainable Artificial Intelligence
Published 2025-01-01Subjects: “…IoT security…”
Get full text
Article