You are currently on the new version of our website. Access the old version .

718 Results Found

  • Article
  • Open Access
353 Views
18 Pages

One of the major challenges for effective intrusion detection systems (IDSs) is continuously and efficiently incorporating changes on cyber-attack tactics, techniques, and procedures in the Internet of Things (IoT). Semi-automated cross-organizationa...

  • Review
  • Open Access
182 Citations
15,420 Views
40 Pages

17 August 2019

Vehicular ad hoc networks (VANETs) are an emerging type of mobile ad hoc networks (MANETs) with robust applications in intelligent traffic management systems. VANET has drawn significant attention from the wireless communication research community an...

  • Article
  • Open Access
45 Citations
13,803 Views
27 Pages

A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges

  • Abeer Iftikhar Tahirkheli,
  • Muhammad Shiraz,
  • Bashir Hayat,
  • Muhammad Idrees,
  • Ahthasham Sajid,
  • Rahat Ullah,
  • Nasir Ayub and
  • Ki-Il Kim

Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the capital cost and workforce, which attracts orga...

  • Article
  • Open Access
42 Citations
10,503 Views
17 Pages

Social Media Adoption by Health Professionals: A TAM-Based Study

  • Md Irfanuzzaman Khan,
  • M Abu Saleh and
  • Ali Quazi

This research identifies the underlying drivers impacting on healthcare professionals’ social media usage behaviours using the technology acceptance model (TAM) as the theoretical lens. A self-administered survey questionnaire was developed and admin...

  • Proceeding Paper
  • Open Access
4 Citations
3,924 Views
10 Pages

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working...

  • Article
  • Open Access
5 Citations
2,596 Views
22 Pages

20 October 2024

The fast proliferation of Internet of Things (IoT) devices has dramatically altered healthcare, increasing the efficiency and efficacy of smart health ecosystems. However, this expansion has created substantial security risks, as cybercriminals incre...

  • Review
  • Open Access
4 Citations
6,456 Views
45 Pages

2 April 2025

The pervasive use of social media platforms, such as X (formerly Twitter), has become a part of our daily lives, simultaneously increasing the threat of cyber attacks. To address this risk, numerous studies have explored methods to detect and predict...

  • Article
  • Open Access
5 Citations
27,009 Views
25 Pages

15 January 2025

In recent years, cyberattacks have increased in sophistication, using a variety of tools to exploit vulnerabilities across the global digital landscapes. Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and...

  • Article
  • Open Access
4 Citations
1,475 Views
10 Pages

27 December 2013

In intelligent transport systems, connectivity of vehicle is the main feature for improving services to the driver and passengers. In Electric Vehicle domain, permanent connectivity is paramount in order to compensate both the limited range and to ac...

  • Article
  • Open Access
32 Citations
10,494 Views
12 Pages

Controller–Pilot Data Link Communication Security

  • Andrei Gurtov,
  • Tatiana Polishchuk and
  • Max Wernberg

20 May 2018

The increased utilization of the new types of cockpit communications, including controller–pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristi...

  • Review
  • Open Access
36 Citations
8,226 Views
31 Pages

22 October 2018

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. R...

  • Review
  • Open Access
174 Citations
18,941 Views
43 Pages

Security Requirements and Challenges of 6G Technologies and Applications

  • Shimaa A. Abdel Hakeem,
  • Hanan H. Hussein and
  • HyungWon Kim

2 March 2022

After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-...

  • Systematic Review
  • Open Access
32 Citations
8,837 Views
38 Pages

21 June 2022

During the last several years, the Internet of Things (IoT), fog computing, computer security, and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile devices such as tablets and smartphones. Attacks can take place t...

  • Article
  • Open Access
59 Citations
6,824 Views
23 Pages

5 May 2022

In this paper, a layered architecture incorporating Blockchain technology (BCT) and Machine Learning (ML) is proposed in the context of the Industrial Internet-of-Things (IIoT) for smart manufacturing applications. The proposed architecture is compos...

  • Article
  • Open Access
32 Citations
5,663 Views
16 Pages

11 February 2022

The concept of a smart city requires the integration of information and communication technologies and devices over a network for the better provision of services to citizens. As a result, the quality of living is improved by continuous analyses of d...

  • Feature Paper
  • Review
  • Open Access
23 Citations
11,459 Views
26 Pages

Biometric Systems De-Identification: Current Advancements and Future Directions

  • Md Shopon,
  • Sanjida Nasreen Tumpa,
  • Yajurv Bhatia,
  • K. N. Pavan Kumar and
  • Marina L. Gavrilova

31 August 2021

Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applic...

  • Article
  • Open Access
778 Views
25 Pages

Enhancing Cyberattack Prevention Through Anomaly Detection Ensembles and Diverse Training Sets

  • Faisal Saleem S Alraddadi,
  • Luis F. Lago-Fernández and
  • Francisco B. Rodríguez

3 November 2025

A surge in global connectivity has led to an increase in cyberattacks, creating a need for improved security. A promising area of research is using machine learning to detect these attacks. Traditional two-class machine learning models can be ineffec...

  • Article
  • Open Access
3 Citations
2,770 Views
14 Pages

Privacy: An Axiomatic Approach

  • Alexander Ziller,
  • Tamara T. Mueller,
  • Rickmer Braren,
  • Daniel Rueckert and
  • Georgios Kaissis

16 May 2022

The increasing prevalence of large-scale data collection in modern society represents a potential threat to individual privacy. Addressing this threat, for example through privacy-enhancing technologies (PETs), requires a rigorous definition of what...

  • Article
  • Open Access
29 Citations
14,250 Views
29 Pages

Automated Cyber and Privacy Risk Management Toolkit

  • Gustavo Gonzalez-Granadillo,
  • Sofia Anna Menesidou,
  • Dimitrios Papamartzivanos,
  • Ramon Romeu,
  • Diana Navarro-Llobet,
  • Caxton Okoh,
  • Sokratis Nifakos,
  • Christos Xenakis and
  • Emmanouil Panaousis

15 August 2021

Addressing cyber and privacy risks has never been more critical for organisations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic app...

  • Article
  • Open Access
15 Citations
9,804 Views
16 Pages

Social Media and the Scourge of Visual Privacy

  • Jasmine DeHart,
  • Makya Stell and
  • Christan Grant

21 January 2020

Online privacy has become immensely important with the growth of technology and the expansion of communication. Social Media Networks have risen to the forefront of current communication trends. With the current trends in social media, the question n...

  • Review
  • Open Access
111 Citations
39,992 Views
27 Pages

Security and Privacy in Cloud Computing: Technical Review

  • Yunusa Simpa Abdulsalam and
  • Mustapha Hedabou

27 December 2021

Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability...

  • Article
  • Open Access
1 Citations
1,573 Views
13 Pages

PEDRO: Privacy-Enhancing Decision suppoRt tOol

  • Paul van Schaik and
  • Karen Renaud

11 October 2024

Citizens face online privacy threats from social media, online service providers and governments. Privacy-enhancing tools (PETs) can prevent privacy invasion, but the uptake of these is limited. We developed a novel conceptual framework for privacy s...

  • Article
  • Open Access
7 Citations
3,364 Views
21 Pages

28 September 2022

In recent years, sharing threat information has been one of the most suggested solutions for combating the ever-increasing number of cyberattacks, which stem from the system-wide adoption of Information and Communication Technology (ICT) and conseque...

  • Article
  • Open Access
14 Citations
5,150 Views
22 Pages

3 September 2021

Internet of Things (IoT) applications are becoming more integrated into our society and daily lives, although many of them can expose the user to threats against their privacy. Therefore, we find that it is crucial to address the privacy requirements...

  • Review
  • Open Access
10 Citations
16,980 Views
37 Pages

10 July 2023

The number of devices connected within organisational networks through ”Bring Your Own Device” (BYOD) initiatives has steadily increased. BYOD security risks have resulted in significant privacy and security issues impacting organisationa...

  • Review
  • Open Access
6 Citations
3,998 Views
31 Pages

GDP vs. LDP: A Survey from the Perspective of Information-Theoretic Channel

  • Hai Liu,
  • Changgen Peng,
  • Youliang Tian,
  • Shigong Long,
  • Feng Tian and
  • Zhenqiang Wu

19 March 2022

The existing work has conducted in-depth research and analysis on global differential privacy (GDP) and local differential privacy (LDP) based on information theory. However, the data privacy preserving community does not systematically review and an...

  • Article
  • Open Access
9 Citations
4,564 Views
61 Pages

25 December 2023

Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Althoug...

  • Review
  • Open Access
61 Citations
12,024 Views
24 Pages

21 January 2023

Recent advances in hardware and information technology have accelerated the proliferation of smart and interconnected devices facilitating the rapid development of the Internet of Things (IoT). IoT applications and services are widely adopted in envi...

  • Article
  • Open Access
2 Citations
3,187 Views
16 Pages

Federated learning has been widely applied because it enables a large number of IoT devices to conduct collaborative training while maintaining private data localization. However, the security risks and threats faced by federated learning in IoT appl...

  • Article
  • Open Access
40 Citations
5,088 Views
19 Pages

Intelligent Cyber-Security System for IoT-Aided Drones Using Voting Classifier

  • Rizwan Majeed,
  • Nurul Azma Abdullah,
  • Muhammad Faheem Mushtaq,
  • Muhammad Umer and
  • Michele Nappi

25 November 2021

Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this interlink is provided by the Internet of Things (IoT). However, architec...

  • Article
  • Open Access
3 Citations
8,151 Views
15 Pages

A Study on Exploring the Level of Awareness of Privacy Concerns and Risks

  • Tommy Nguyen,
  • Garnet Yeates,
  • Tony Ly and
  • Umar Albalawi

14 December 2023

With the recent increase in phishing attacks and other kinds of malicious activities, increasing the awareness of security and privacy awareness is arguably one of the best proven ways of preventing these kinds of threats. The main challenge in secur...

  • Systematic Review
  • Open Access
47 Citations
14,599 Views
60 Pages

The ongoing evolution of cloud computing requires sustained attention to security, privacy, and compliance issues. The purpose of this paper is to systematically review the current literature regarding the application of federated learning (FL) and a...

  • Review
  • Open Access
171 Citations
18,849 Views
27 Pages

A Survey of Security in Cloud, Edge, and Fog Computing

  • Aleksandr Ometov,
  • Oliver Liombe Molua,
  • Mikhail Komarov and
  • Jari Nurmi

25 January 2022

The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures...

  • Article
  • Open Access
2 Citations
2,183 Views
15 Pages

A Distributed and Secure Self-Sovereign-Based Framework for Systems of Systems

  • Dhiah el Diehn I. Abou-Tair,
  • Raad Haddad,
  • Ala’ Khalifeh,
  • Sahel Alouneh and
  • Roman Obermaisser

2 September 2023

Security and privacy are among the main challenges in the systems of systems. The distributed ledger technology and self-sovereign identity pave the way to empower systems and users’ security and privacy. By utilizing both technologies, this pa...

  • Review
  • Open Access
88 Citations
30,384 Views
41 Pages

16 October 2022

The Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data,...

  • Article
  • Open Access
6 Citations
4,645 Views
25 Pages

21 January 2021

Social Networks (SNs) bring new types of privacy risks threats for users; which developers should be aware of when designing respective services. Aiming at safeguarding users’ privacy more effectively within SNs, self-adaptive privacy preserving sche...

  • Review
  • Open Access
18 Citations
4,428 Views
19 Pages

A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services

  • Shiwen Zhang,
  • Mengling Li,
  • Wei Liang,
  • Voundi Koe Arthur Sandor and
  • Xiong Li

17 August 2022

As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy. A large num...

  • Review
  • Open Access
19 Citations
9,389 Views
33 Pages

Health IoT Threats: Survey of Risks and Vulnerabilities

  • Samaneh Madanian,
  • Tserendorj Chinbat,
  • Maduka Subasinghage,
  • David Airehrour,
  • Farkhondeh Hassandoust and
  • Sira Yongchareon

23 October 2024

The secure and efficient collection of patients’ vital information is a challenge faced by the healthcare industry. Through the adoption and application of Internet of Things (IoT), the healthcare industry has seen an improvement in the quality...

  • Article
  • Open Access
11 Citations
5,391 Views
23 Pages

Users' awareness of the extent of information implicit in their geo-profiles on social networks is limited. This questions the validity of their consent to the collection, storage and use of their data. Tools for location privacy awareness are need...

  • Article
  • Open Access
5 Citations
3,013 Views
17 Pages

27 February 2023

Online social networks (OSNs) have experienced rapid growth in recent years, and an increasing number of people now use OSNs, such as Facebook and Twitter, to share and spread information on a daily basis. As a special type of information, user perso...

  • Article
  • Open Access
2 Citations
1,761 Views
16 Pages

DC-NFC: A Custom Deep Learning Framework for Security and Privacy in NFC-Enabled IoT

  • Abdul Rehman,
  • Omar Alharbi,
  • Yazeed Qasaymeh and
  • Amer Aljaedi

24 February 2025

NFC has emerged as a critical technology in IoET ecosystems, facilitating seamless data exchange in proximity-based systems. However, the security and privacy challenges associated with NFC-enabled IoT devices remain significant, exposing them to var...

  • Article
  • Open Access
751 Views
47 Pages

AI-Driven Blockchain and Federated Learning for Secure Electronic Health Records Sharing

  • Muhammad Saeed Javed,
  • Ali Hennache,
  • Muhammad Imran and
  • Muhammad Kamran Khan

4 December 2025

The proliferation of electronic health records necessitates secure and privacy-preserving data sharing frameworks to combat escalating cybersecurity threats in healthcare. Current systems face critical limitations including centralized data repositor...

  • Article
  • Open Access
256 Views
19 Pages

26 November 2025

Traditional image watermarking technology focuses on the robustness and imperceptibility of the copyright information embedded in the cover image. However, in addition to copyright theft, the cover images stored and transmitted in the open network en...

  • Article
  • Open Access
317 Views
27 Pages

16 December 2025

Historical inference attacks pose a critical privacy threat in mobile edge computing (MEC), where adversaries exploit long-term task and location patterns to infer users’ sensitive information. To address this challenge, we propose a privacy-pr...

  • Article
  • Open Access
18 Citations
6,955 Views
45 Pages

Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

  • Abdel-Shakour Abuzneid,
  • Tarek Sobh,
  • Miad Faezipour,
  • Ausif Mahmood and
  • John James

10 March 2015

Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs i...

  • Article
  • Open Access
6 Citations
4,900 Views
24 Pages

9 December 2020

Mobile cloud computing (MCC) is a domain that stemmed from advances in mobile technology and cloud computing. Although debate continues about the best strategies to preserve privacy and personal data protection in MCC, it is essential to explore the...

  • Article
  • Open Access
2 Citations
2,609 Views
17 Pages

29 August 2024

As data-driven deep learning (DL) has been applied in various scenarios, the privacy threats have become a widely recognized problem. To boost privacy protection in federated learning (FL), some methods adopt a one-shot differential privacy (DP) appr...

  • Review
  • Open Access
50 Citations
12,273 Views
18 Pages

A Detailed Survey on Federated Learning Attacks and Defenses

  • Hira Shahzadi Sikandar,
  • Huda Waheed,
  • Sibgha Tahir,
  • Saif U. R. Malik and
  • Waqas Rafique

A traditional centralized method of training AI models has been put to the test by the emergence of data stores and public privacy concerns. To overcome these issues, the federated learning (FL) approach was introduced. FL employs a privacy-by-design...

  • Article
  • Open Access
2 Citations
3,775 Views
19 Pages

Defending Against AI Threats with a User-Centric Trustworthiness Assessment Framework

  • Efi Kafali,
  • Davy Preuveneers,
  • Theodoros Semertzidis and
  • Petros Daras

This study critically examines the trustworthiness of widely used AI applications, focusing on their integration into daily life, often without users fully understanding the risks or how these threats might affect them. As AI apps become more accessi...

  • Article
  • Open Access
4 Citations
3,678 Views
16 Pages

18 April 2022

The aim of this study is to gain a comprehensive understanding of how risk and value factors affect the intention to use South Korean exploitable cyber-security communities based on the value-maximisation perspective of economics. According to the re...

of 15