Topic Review
Securing Internet of Things Applications Using Key Management
The Internet of Things (IoT) emerged when everyday objects began connecting to the Internet and interacting with each other autonomously without human intervention. IoT devices follow the IEEE 802.15.4 standard to enable network connectivity for resource-constrained devices using short-range, lightweight communication protocols.
  • 50
  • 07 Apr 2024
Topic Review
Edge Data Analytics
Edge data analytics refers to processing near data sources at the edge of the network to reduce delays in data transmission and, consequently, enable real-time interactions. However, data analytics at the edge introduces numerous security risks that can impact the data being processed. Thus, safeguarding sensitive data from being exposed to illegitimate users is crucial to avoiding uncertainties and maintaining the overall quality of the service offered. Most existing edge security models have considered attacks during data analysis as an afterthought.
  • 157
  • 14 Mar 2024
Topic Review
Advanced Persistent Thread and Common Systems Behavioral Sources
The rapid proliferation of Internet of Things (IoT) networks in Colombia and various global regions has unquestionably resulted in a significant increase in cyberattacks. This rapid expansion of interconnected devices carries significant implications for individuals, organizations, and governing entities.
  • 241
  • 08 Mar 2024
Topic Review
Healthcare Data Security for Modern Healthcare System
The advent of Artificial Intelligence (AI) and the Internet of Things (IoT) have recently created previously unimaginable opportunities for boosting clinical and patient services, reducing costs and improving community health. Yet, a fundamental challenge that the modern healthcare management system faces is storing and securely transferring data.
  • 74
  • 21 Feb 2024
Topic Review
Optimizing Cybersecurity Attack Detection in Computer Networks
In computer network security, the escalating use of computer networks and the corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) to the forefront of research in computer science. IDSs are a crucial security technology that diligently monitor network traffic and host activities to identify unauthorized or malicious behavior.
  • 105
  • 02 Feb 2024
Topic Review
Threshold-Optimized Depth-Based Routing Protocol
The exponentially growing concern of cyber-attacks on extremely dense underwater sensor networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel research challenges and issues. 
  • 239
  • 29 Jan 2024
Topic Review
Industrial IoT Network Infrastructure
The Internet of Things (IoT) is an innovative technology that presents effective and attractive solutions to revolutionize various domains. Numerous solutions based on the IoT have been designed to automate industries, manufacturing units, and production houses to mitigate human involvement in hazardous operations. The industrial IoT (IIoT) network infrastructure is the backbone of the IoT for industries, and helps to connect many sensory, physical, and network devices to improve product quality and the manufacturing process, thereby playing an important part in the growth of IIoT. The infrastructure in IoT-enabled industrial network architecture comprises the industrial network platform, the network topology, and protocols.
  • 145
  • 29 Jan 2024
Topic Review
Insider Cyber Security Threat
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyber security is a more concerning issue and is incorporated into almost every smart gadget and has become a prerequisite in every software product and service. There are various mitigations for external cyber security attacks, but hardly any for insider security threats, as they are difficult to detect and mitigate. Thus, insider cyber security threat detection has become a serious concern.
  • 115
  • 26 Jan 2024
Topic Review
Enhancing Cloud-Based Security
Developing a simple and efficient attack detection system for ensuring the security of cloud systems against cyberthreats is a crucial and demanding process in the present time. In traditional work, various machine-learning-based detection methodologies have been developed for securing the cloud network. 
  • 67
  • 25 Jan 2024
Topic Review
Generative Adversarial Network for Wireless Physical Layer Authentication
Wireless physical layer authentication has emerged as a promising approach to wireless security. The topic of wireless node classification and recognition has experienced significant advancements due to the rapid development of deep learning techniques. Ubiquitous technologies are experiencing significant growth, characterized by the development of several innovative systems, including smart vehicles, smart homes, smart cities and intelligent applications in industries and healthcare. 
  • 76
  • 24 Jan 2024
  • Page
  • of
  • 10