-
1
Securing Cloud-Based Internet of Things: Challenges and Mitigations
Published 2024-12-01Subjects: Get full text
Article -
2
A Survey on Addressing IoT Security Issues by Embedding Blockchain Technology Solutions: Review, Attacks, Current Trends, and Applications
Published 2024-01-01Subjects: Get full text
Article -
3
Research on intrusion detection method for edge networks based on federated reinforcement learning
Published 2024-12-01Subjects: Get full text
Article -
4
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01Subjects: Get full text
Article -
5
Research on IoT security situation awareness method based on evidence theory
Published 2022-04-01Subjects: Get full text
Article -
6
Lightweight Block and Stream Cipher Algorithm: A Review
Published 2024-06-01Subjects: “…IoT security…”
Get full text
Article -
7
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
8
-
9
A Lightweight AI-Based Approach for Drone Jamming Detection
Published 2025-01-01Subjects: Get full text
Article -
10
A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security
Published 2024-01-01Subjects: “…Cloud Computing, IoT, IoT Security, Cyber Security, Cloud Attacks, Cloud Attacks Prevention…”
Get full text
Article -
11
Design and Implementation of an Ethical AI-Based Teaching Assistant for IoT Security Education
Published 2024-12-01Subjects: Get full text
Article -
12
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01Subjects: “…IoT security…”
Get full text
Article -
13
Review of iOS malicious application analysis
Published 2017-02-01Subjects: “…iOS security…”
Get full text
Article -
14
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01Subjects: “…CICIoT2023 Dataset, Feature scaling, IoT Security, Deep learning, LSTM Models, Whale optimization algorithm (WOA), Detect IoT Attacks.…”
Get full text
Article