|
[1]
|
Synergies in Data Analytics and Cyber Security
Lecture Notes in Electrical Engineering,
2026
DOI:10.1007/978-981-95-2680-2_43
|
|
|
|
|
[2]
|
Revolutionizing Data Exchange Through Intelligent Automation: Insights and Trends
Computers,
2025
DOI:10.3390/computers14050194
|
|
|
|
|
[3]
|
IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks
The Journal of Engineering,
2025
DOI:10.1049/tje2.70103
|
|
|
|
|
[4]
|
Reading Lips: An Analytical Framework for Adversarial Passive Detection of Wireless Traffic in IoT Ecosystems
IEEE Access,
2025
DOI:10.1109/ACCESS.2025.3573249
|
|
|
|
|
[5]
|
Hybrid Optimization and Ensemble Deep Learning Framework for Efficient Anomaly-Based Intrusion Detection in IoT Networks
SN Computer Science,
2025
DOI:10.1007/s42979-025-04156-1
|
|
|
|
|
[6]
|
Blockchain-Driven Zero Trust Framework for Enhancing Network Security in Distributed Enterprises
2025 IEEE International Conference on Advanced Computing Technologies (ICACT),
2025
DOI:10.1109/ICACT67549.2025.11351370
|
|
|
|
|
[7]
|
Computer and Information Security Handbook
2025
DOI:10.1016/B978-0-443-13223-0.00091-6
|
|
|
|
|
[8]
|
Intelligent Solutions for Smart Adaptation in Digital Era
Lecture Notes in Electrical Engineering,
2025
DOI:10.1007/978-981-97-8193-5_11
|
|
|
|
|
[9]
|
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions
Sensors,
2025
DOI:10.3390/s25061649
|
|
|
|
|
[10]
|
Review of Adaptive Deep Learning Approaches for Intrusion Detection in IoT Network
International Journal of Advanced Research in Science, Communication and Technology,
2025
DOI:10.48175/IJARSCT-24417
|
|
|
|
|
[11]
|
Deception Mechanisms for Cyber-Security Enhancement in the Internet of Things
2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD),
2024
DOI:10.1109/CAMAD62243.2024.10942923
|
|
|
|
|
[12]
|
Comparative study on applications of cybersecurity tools for Kali Linux operating system
CYBER DEFENSE IRAQ: CDI2024,
2024
DOI:10.1063/5.0234136
|
|
|
|
|
[13]
|
Overview of Machine Learning Techniques in Cybersecurity Data Science using Gradient Boosting and Random Forest Algorithm
2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI),
2024
DOI:10.1109/ICoICI62503.2024.10696688
|
|
|
|
|
[14]
|
Blockchain Technology for IoT Security and Trust: A Comprehensive SLR
Sustainability,
2024
DOI:10.3390/su162310177
|
|
|
|
|
[15]
|
Simulation of an Ethical Hack Attack on IOT System
2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT),
2024
DOI:10.1109/ICCCNT61001.2024.10724282
|
|
|
|
|
[16]
|
An inductive analysis of collaborative cybersecurity management capabilities, relational antecedents and supply chain cybersecurity parameters
International Journal of Physical Distribution & Logistics Management,
2024
DOI:10.1108/IJPDLM-01-2023-0034
|
|
|
|
|
[17]
|
Multicriteria group decision making for prioritizing IoT risk factors with linear diophantine fuzzy sets and MARCOS method
Granular Computing,
2024
DOI:10.1007/s41066-024-00480-8
|
|
|
|
|
[18]
|
Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves
Information,
2024
DOI:10.3390/info15050282
|
|
|
|
|
[19]
|
Traceability and Prevention System Construction of Network Attacks Driven by Big Data
2023 IEEE International Conference on Paradigm Shift in Information Technologies with Innovative Applications in Global Scenario (ICPSITIAGS),
2023
DOI:10.1109/ICPSITIAGS59213.2023.10527460
|
|
|
|
|
[20]
|
Blockchain in Healthcare
Integrated Science,
2023
DOI:10.1007/978-3-031-14591-9_7
|
|
|
|
|
[21]
|
Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking
IEEE Access,
2023
DOI:10.1109/ACCESS.2023.3257171
|
|
|
|
|
[22]
|
Advances in Data Science and Artificial Intelligence
Springer Proceedings in Mathematics & Statistics,
2023
DOI:10.1007/978-3-031-16178-0_25
|
|
|
|
|
[23]
|
An Examination of Cybersecurity Threats and Authentication Systems
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE),
2023
DOI:10.1109/ICACITE57410.2023.10182687
|
|
|
|
|
[24]
|
Cybersecurity Risk Analysis in the IoT: A Systematic Review
Electronics,
2023
DOI:10.3390/electronics12183958
|
|
|
|
|
[25]
|
Guaranteeing information integrity and access control in smart cities through blockchain
Journal of Ambient Intelligence and Humanized Computing,
2022
DOI:10.1007/s12652-022-03718-y
|
|
|
|
|
[26]
|
Injection attack detection using machine learning for smart IoT applications
Physical Communication,
2022
DOI:10.1016/j.phycom.2022.101685
|
|
|
|
|
[27]
|
A Brief Review on Internet of Things, Industry 4.0 and Cybersecurity
Electronics,
2022
DOI:10.3390/electronics11111742
|
|
|
|
|
[28]
|
New Approaches to Data Analytics and Internet of Things Through Digital Twin
Advances in Systems Analysis, Software Engineering, and High Performance Computing,
2022
DOI:10.4018/978-1-6684-5722-1.ch011
|
|
|
|
|
[29]
|
A model for evaluating the impediments to secure and trustworthy IoT environment: a software industry study
Management of Environmental Quality: An International Journal,
2022
DOI:10.1108/MEQ-07-2022-0195
|
|
|
|
|
[30]
|
Davis Mayer Streebog Cryptographic Hash-Based Blockchain for Secure Transaction Management Using SDN in IIoT Applications
Journal of Signal Processing Systems,
2022
DOI:10.1007/s11265-022-01825-9
|
|
|
|
|
[31]
|
IoT Device Attack Surface Feature Identification using Differentiated Dynamic Monitoring
2022 IEEE 5th International Conference on Automation, Electronics and Electrical Engineering (AUTEEE),
2022
DOI:10.1109/AUTEEE56487.2022.9994289
|
|
|
|
|
[32]
|
IoT network security using autoencoder deep neural network and channel access algorithm
Journal of Intelligent Systems,
2021
DOI:10.1515/jisys-2021-0173
|
|
|
|
|
[33]
|
A Systematic Review of Security Issues and challenges with Futuristic Wearable Internet of Things (IoTs)
2021 International Conference on Technological Advancements and Innovations (ICTAI),
2021
DOI:10.1109/ICTAI53825.2021.9673353
|
|
|
|
|
[34]
|
An information security analysis method of Internet of things based on balanced double SVM
Journal of Intelligent & Fuzzy Systems,
2020
DOI:10.3233/JIFS-189259
|
|
|
|
|
[35]
|
A Survey on the Security of Low Power Wide Area Networks: Threats, Challenges, and Potential Solutions
Sensors,
2020
DOI:10.3390/s20205800
|
|
|
|