AI Driven Cybersecurity for Industrial IoT Networks DOI
Zahid Khan, Sher Taj, Faheem Khan

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 55 - 90

Published: Feb. 21, 2025

Industrial Internet of Things (IIoT) networks, essential to modern manufacturing, logistics, and critical infrastructure, face unprecedented cybersecurity challenges. As IIoT networks expand, integrating countless interconnected devices, they are increasingly exposed cyber threats that exploit system vulnerabilities, jeopardizing data integrity, operational continuity, safety. Traditional security measures, while effective in standard IT environments, often lack the adaptability real-time responsiveness needed for IIoT's unique requirements. In response, Artificial Intelligence (AI) has emerged as a transformative solution, offering enhanced detection, prediction, response capabilities tailored complex landscape. This chapter explores role AI-driven approaches advancing networks.

Language: Английский

Navigating Challenges in IoT: Applications, Limitations, Tools and Open Research Direction DOI
Md Ozaif, Suhel Mustajab, Mahfooz Alam

et al.

2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT), Journal Year: 2024, Volume and Issue: 22, P. 525 - 531

Published: April 6, 2024

The Internet of Things (IoT) has come out as a transformative technology paradigm which enables the seamless integration physical objects into digital world. With rapid increase connected devices and increasing availability data, IoT found numerous applications across various domains such buildings/homes, agriculture, healthcare, environment, industries, etc. However, along with its promises, also presents certain limitations challenges that require to be addressed for global adoption. Lack security privacy, storage problems, trash disposal, energy requirements, need open standards, novel use cases are few difficulties. In paper, an overview is provided, discussed, tools technologies employed in development explored, research directions can shape future presented.

Language: Английский

Citations

5

Revolutionizing primary health care in Tanzania: unravelling the contextual factors on electronic health record systems implementation for effective decision support DOI

Augustino Mwogosi

Journal of Science and Technology Policy Management, Journal Year: 2024, Volume and Issue: unknown

Published: Aug. 1, 2024

Purpose This qualitative case study aims to identify and analyse the factors influencing implementation effectiveness of electronic health record systems (EHRS) in primary health-care (PHC) facilities Tanzania. explore ways optimize use EHRS for better service delivery. Design/methodology/approach The uses a design. Data were collected through interviews focus groups conducted with workers information communication technology officers at PHC Purposive sampling data source triangulation used address potential biases limitations associated study’s small sample size. Findings identifies several key findings related Tanzanian facilities. obstacles include inadequate technical infrastructure, poor internet connectivity insufficient financial resources. suggests comprehensive strategy improving EHRS, emphasizing patient professional involvement system design, investments infrastructure connectivity, quality accuracy ongoing support training. Originality/value research contributes existing body knowledge by offering nuanced understanding context. It emphasizes need tailored solutions strategies specific region’s challenges opportunities. originality lies its on context, providing valuable insights future initiatives. A policy implication underscores importance supportive regulatory framework, dedicated resources consistent stakeholder successful implementation.

Language: Английский

Citations

5

Auditing of Outsourced Data in Cloud Computing: An Overview DOI

Haider Ali,

Shafiqul Abidin,

Mahfooz Alam

et al.

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), Journal Year: 2024, Volume and Issue: unknown, P. 111 - 117

Published: Feb. 28, 2024

One of the key facets this paradigm shift is outsourcing data storage and management to third-party cloud service providers (CSPs). The auditing outsourced a crucial component since it essential upholding accountability confidence. Verification validation integrity, access control, regulatory compliance are all part auditing. loss physical control over storage, opaqueness provider operations, worries about privacy confidentiality some difficulties associated with data. This paper examines potential avenues for growth in field computing. As more businesses rely on services, critical guarantee accuracy, safety, their also provides an in-depth overview concept computing, delving into challenges, existing solutions, future directions pivotal field.

Language: Английский

Citations

4

Harnessing Machine Learning Intelligence Against Cyber Threats DOI
Bhupinder Singh, Christian Kaunert, Ritu Gautam

et al.

Advances in business strategy and competitive advantage book series, Journal Year: 2024, Volume and Issue: unknown, P. 319 - 352

Published: Aug. 28, 2024

The spread of cyberthreats in the digital age presents serious concerns to national security, stability economy, and personal privacy. Traditional security methods are unable keep up with increasing sophistication size cyberattacks. With facilitating quick identification mitigation cyberthreats, machine learning (ML) has revolutionary potential improve cybersecurity measures. But applying ML this field also brings important moral legal issues, particularly light international cybercrimes. This chapter comprehensively explores learning's dual nature cybersecurity, emphasizing both its advantages disadvantages. It talk about state cyber threats today, how is being incorporated into ramifications using investigations.

Language: Английский

Citations

4

Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher DOI
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Imran Khan

et al.

SN Computer Science, Journal Year: 2025, Volume and Issue: 6(2)

Published: Jan. 22, 2025

Language: Английский

Citations

0

An efficient function placement approach in serverless edge computing DOI

Atiya Zahed,

Mostafa Ghobaei‐Arani, Leila Esmaeili

et al.

Computing, Journal Year: 2025, Volume and Issue: 107(3)

Published: Feb. 21, 2025

Language: Английский

Citations

0

The Future of Ethical Hacking: Charting the Uncharted in Cybersecurity DOI

Gleuto M. Serafim

Lecture notes in networks and systems, Journal Year: 2025, Volume and Issue: unknown, P. 17 - 30

Published: Jan. 1, 2025

Language: Английский

Citations

0

An IoT-Enabled Cloud Computing Model for Authentication and Data Confidentiality using Lightweight Cryptography DOI
Salman Ali, Faisal Anwer

Arabian Journal for Science and Engineering, Journal Year: 2025, Volume and Issue: unknown

Published: Feb. 6, 2025

Language: Английский

Citations

0

Quantum Technologies and Cybersecurity in Economy and Industry: A Review and Main Challenges DOI
Guillermo Rivas-Oliveros,

Arturo Rodríguez-Almazán,

Daniela Falcó-Pomares

et al.

Lecture notes in networks and systems, Journal Year: 2025, Volume and Issue: unknown, P. 360 - 369

Published: Jan. 1, 2025

Language: Английский

Citations

0

Lightweight Cryptography: Integrating Feedback DNA with the AES Algorithm for Enhanced Security DOI
Salman Ali, Faisal Anwer,

Faizan Ahamad

et al.

Published: Jan. 1, 2025

Language: Английский

Citations

0