Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. [PDF]
Abood EW +4 more
europepmc +1 more source
Security and Privacy in Wireless Sensor Networks: Advances and Challenges. [PDF]
Lee CC.
europepmc +1 more source
Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework. [PDF]
Jabar T, Mahinderjit Singh M.
europepmc +1 more source
Machine Learning for Industry 4.0: A Systematic Review Using Deep Learning-Based Topic Modelling. [PDF]
Mazzei D, Ramjattan R.
europepmc +1 more source
Applications of Blockchain and Smart Contracts to Address Challenges of Cooperative, Connected, and Automated Mobility. [PDF]
Kontos C, Panagiotakopoulos T, Kameas A.
europepmc +1 more source
A case study of using natural language processing to extract consumer insights from tweets in American cities for public health crises. [PDF]
Wang Y +4 more
europepmc +1 more source
A comprehensive survey on securing the social internet of things: protocols, threat mitigation, technological integrations, tools, and performance metrics. [PDF]
Patil DA, G S.
europepmc +1 more source
Searchable Deterministic Encryption against the Keyword Guessing Attack by Outside Attacker
Zhiyuan Liu, Liu zhenghua
openalex +1 more source
Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data. [PDF]
Li S, Li M, Xu H, Zhou X.
europepmc +1 more source

