You are currently on the new version of our website. Access the old version .

718 Results Found

  • Article
  • Open Access
2 Citations
6,599 Views
15 Pages

As COVID-19 became a pandemic worldwide, contact tracing technologies and information systems were developed for quick control of infectious diseases in both the private and public sectors. This study aims to strengthen the data subject’s secur...

  • Article
  • Open Access
5 Citations
5,338 Views
19 Pages

Group-Privacy Threats for Geodata in the Humanitarian Context

  • Brian K. Masinde,
  • Caroline M. Gevaert,
  • Michael H. Nagenborg and
  • Jaap A. Zevenbergen

The role of geodata technologies in humanitarian action is arguably indispensable in determining when, where, and who needs aid before, during, and after a disaster. However, despite the advantages of using geodata technologies in humanitarianism (i....

  • Article
  • Open Access
41 Citations
6,164 Views
15 Pages

15 December 2020

With the advent of smart devices, smartphones, and smart everything, the Internet of Things (IoT) has emerged with an incredible impact on the industries and human life. The IoT consists of millions of clients that exchange massive amounts of critica...

  • Review
  • Open Access
10 Citations
4,982 Views
30 Pages

8 April 2025

Cloud-native architecture is becoming increasingly popular in today’s digital environment, driving the demand for robust security precautions to protect infrastructure and applications. This paper examines a variety of privacy-enhancing and tru...

  • Article
  • Open Access
55 Citations
8,906 Views
52 Pages

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

  • Abdullah Al-Noman Patwary,
  • Ranesh Kumar Naha,
  • Saurabh Garg,
  • Sudheer Kumar Battula,
  • Md Anwarul Kaium Patwary,
  • Erfan Aghasian,
  • Muhammad Bilal Amin,
  • Aniket Mahanti and
  • Mingwei Gong

Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists...

  • Article
  • Open Access
931 Views
25 Pages

Email continues to serve as a primary vector for cyber-attacks, with phishing, spoofing, and polymorphic malware evolving rapidly to evade traditional defences. Conventional email security systems, often reliant on static, signature-based detection s...

  • Article
  • Open Access
245 Views
13 Pages

26 December 2025

Insider threats remain one of the most challenging security risks in modern enterprises due to their subtle behavioral patterns and the difficulty of distinguishing malicious intent from legitimate activity. This paper presents a unified and adaptive...

  • Article
  • Open Access
3 Citations
3,647 Views
18 Pages

The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation

  • Vasileios Vlachos,
  • Yannis C. Stamatiou and
  • Sotiris Nikoletseas

29 January 2023

Instilling good privacy practices to developers and users appears to be a difficult and daunting task. The World Wide Web encompasses a panspermia of different technologies, commercial and open source apis, evolving security standards and protocols t...

  • Article
  • Open Access
1,006 Views
31 Pages

10 November 2025

The rapid evolution of cyber threats requires intelligence sharing between organizations while ensuring data privacy and contributor credibility. Existing centralized cyber threat intelligence (CTI) systems suffer from single points of failure, priva...

  • Article
  • Open Access
13 Citations
4,522 Views
21 Pages

The rapid expansion of the Internet of Things (IoT) ecosystem has transformed industries but also exposed significant cybersecurity vulnerabilities. Traditional centralized methods for securing IoT networks struggle to balance privacy preservation wi...

  • Article
  • Open Access
103 Citations
25,163 Views
43 Pages

The Internet of Things (IoT) has experienced constant growth in the number of devices deployed and the range of applications in which such devices are used. They vary widely in size, computational power, capacity storage, and energy. The explosive gr...

  • Article
  • Open Access
17 Citations
6,786 Views
17 Pages

11 October 2018

Inference attacks and protection measures are two sides of the same coin. Although the former aims to reveal information while the latter aims to hide it, they both increase awareness regarding the risks and threats from social media apps. On the one...

  • Article
  • Open Access
11 Citations
7,667 Views
30 Pages

Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), enables immersive experiences across various fields, including entertainment, healthcare, and education. However, its data-intensive and interac...

  • Article
  • Open Access
2 Citations
2,668 Views
18 Pages

Communication and Sensing: Wireless PHY-Layer Threats to Security and Privacy for IoT Systems and Possible Countermeasures

  • Renato Lo Cigno,
  • Francesco Gringoli,
  • Stefania Bartoletti,
  • Marco Cominelli,
  • Lorenzo Ghiro and
  • Samuele Zanini

7 January 2025

Recent advances in signal processing and AI-based inference enable the exploitation of wireless communication signals to collect information on devices, people, actions, and the environment in general, i.e., to perform Integrated Sensing And Communic...

  • Article
  • Open Access
7 Citations
4,626 Views
25 Pages

Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles

  • Gianmarco Baldini,
  • José L. Hernandez-Ramos,
  • Slawomir Nowak,
  • Ricardo Neisse and
  • Mateusz Nowak

22 September 2020

It has been proven in research literature that the analysis of encrypted traffic with statistical analysis and machine learning can reveal the type of activities performed by a user accessing the network, thus leading to privacy risks. In particular,...

  • Article
  • Open Access
57 Citations
12,809 Views
30 Pages

19 January 2023

With the global energy crisis, increasing demand, and a national-level emphasis on electric vehicles (EVs), numerous innovations are being witnessed throughout the EV industry. EVs are equipped with sensors that maintain a sustainable environment for...

  • Proceeding Paper
  • Open Access
2 Citations
1,335 Views
14 Pages

Examining Techniques to Enhance the Security and Privacy of IoT Devices and Networks against Cyber Threats

  • Imran Qureshi,
  • Mohammed Abdul Habeeb,
  • Syed Ghouse Mohiuddin Shadab,
  • Burhanuddin Mohammad,
  • Mohammed Irfan,
  • Syed Muhammad Shavalliuddin and
  • Mohit Gupta

Improvements in technology have led to further enhancements in cyber security threats. Additionally, the mass application of IoT technology and networks has made the ecosystem vulnerable to cyber-attacks. Thus, this study focuses on analysing methods...

  • Article
  • Open Access
1 Citations
1,622 Views
21 Pages

C3-VULMAP: A Dataset for Privacy-Aware Vulnerability Detection in Healthcare Systems

  • Jude Enenche Ameh,
  • Abayomi Otebolaku,
  • Alex Shenfield and
  • Augustine Ikpehai

The increasing integration of digital technologies in healthcare has expanded the attack surface for privacy violations in critical systems such as electronic health records (EHRs), telehealth platforms, and medical device software. However, current...

  • Article
  • Open Access
61 Citations
9,464 Views
36 Pages

A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective

  • Hezam Akram Abdulghani,
  • Niels Alexander Nijdam,
  • Anastasija Collen and
  • Dimitri Konstantas

10 June 2019

The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including smart cities, smart cars, and smart grids, offering endless services and solutions. Protecting...

  • Review
  • Open Access
26 Citations
6,160 Views
20 Pages

Architectural Threats to Security and Privacy: A Challenge for Internet of Things (IoT) Applications

  • Yasser Khan,
  • Mazliham Bin Mohd Su’ud,
  • Muhammad Mansoor Alam,
  • Sayed Fayaz Ahmad,
  • Nur Agus Salim and
  • Nasir Khan

The internet of things (IoT) is one of the growing platforms of the current era that has encircled a large population into its domain, and life appears to be useless without adopting this technology. A significant amount of data is generated from an...

  • Review
  • Open Access
1 Citations
2,330 Views
77 Pages

24 September 2025

The smart grid (SG) plays a seminal role in the modern energy landscape by integrating digital technologies, the Internet of Things (IoT), and Advanced Metering Infrastructure (AMI) to enable bidirectional energy flow, real-time monitoring, and enhan...

  • Article
  • Open Access
26 Citations
6,637 Views
29 Pages

PRASH: A Framework for Privacy Risk Analysis of Smart Homes

  • Joseph Bugeja,
  • Andreas Jacobsson and
  • Paul Davidsson

25 September 2021

Smart homes promise to improve the quality of life of residents. However, they collect vasts amounts of personal and sensitive data, making privacy protection critically important. We propose a framework, called PRASH, for modeling and analyzing the...

  • Article
  • Open Access
2,485 Views
39 Pages

28 November 2025

Permissionless blockchains have evolved beyond cryptocurrency into foundations for Web3 applications, decentralized finance (DeFi), and digital asset ownership, yet this rapid expansion has intensified privacy vulnerabilities. This study provides a c...

  • Article
  • Open Access
19 Citations
3,706 Views
19 Pages

Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications

  • Hadeel Alrubayyi,
  • Moudy Sharaf Alshareef,
  • Zunaira Nadeem,
  • Ahmed M. Abdelmoniem and
  • Mona Jaber

29 February 2024

The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT system...

  • Article
  • Open Access
3 Citations
4,149 Views
26 Pages

A Blockchained AutoML Network Traffic Analyzer to Industrial Cyber Defense and Protection

  • Alexandros Papanikolaou,
  • Aggelos Alevizopoulos,
  • Christos Ilioudis,
  • Konstantinos Demertzis and
  • Konstantinos Rantos

Network traffic analysis can raise privacy concerns due to its ability to reveal sensitive information about individuals and organizations. This paper proposes a privacy-preserving Block-chained AutoML Network Traffic Analyzer (BANTA). The system sec...

  • Article
  • Open Access
19 Citations
6,193 Views
18 Pages

Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats

  • Teng Hu,
  • Bangzhou Xin,
  • Xiaolei Liu,
  • Ting Chen,
  • Kangyi Ding and
  • Xiaosong Zhang

16 September 2020

The insider threats have always been one of the most severe challenges to cybersecurity. It can lead to the destruction of the organisation’s internal network system and information leakage, which seriously threaten the confidentiality, integri...

  • Article
  • Open Access
101 Citations
21,595 Views
15 Pages

Privacy and Security in Federated Learning: A Survey

  • Rémi Gosselin,
  • Loïc Vieu,
  • Faiza Loukil and
  • Alexandre Benoit

1 October 2022

In recent years, privacy concerns have become a serious issue for companies wishing to protect economic models and comply with end-user expectations. In the same vein, some countries now impose, by law, constraints on data use and protection. Such co...

  • Article
  • Open Access
10 Citations
4,758 Views
31 Pages

The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. This study addresses these challenges by presenting a federated learning framework enhanced with blockchain...

  • Review
  • Open Access
3 Citations
3,704 Views
31 Pages

13 May 2025

Ensuring the safe, reliable, and energy-efficient provision of electricity is a complex task for smart grid (SG) management applications. Internet of Things (IoT) and edge computing-based SG applications have been proposed for time-responsive monitor...

  • Review
  • Open Access
2,456 Views
25 Pages

Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models

  • Abin Kumbalapalliyil Tom,
  • Ansam Khraisat,
  • Tony Jan,
  • Md Whaiduzzaman,
  • Thien D. Nguyen and
  • Ammar Alazab

8 September 2025

The Industrial Internet of Things (IIoT) is transforming industrial operations through connected devices and real-time automation but also introduces significant cybersecurity risks. Cyber threat intelligence (CTI) is critical for detecting and mitig...

  • Article
  • Open Access
7 Citations
4,294 Views
34 Pages

Securing Federated Learning: Approaches, Mechanisms and Opportunities

  • Mohammad Moshawrab,
  • Mehdi Adda,
  • Abdenour Bouzouane,
  • Hussein Ibrahim and
  • Ali Raad

16 September 2024

With the ability to analyze data, artificial intelligence technology and its offshoots have made difficult tasks easier. The tools of these technologies are now used in almost every aspect of life. For example, Machine Learning (ML), an offshoot of a...

  • Article
  • Open Access
16 Citations
8,091 Views
19 Pages

Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach

  • Marc Jofre,
  • Diana Navarro-Llobet,
  • Ramon Agulló,
  • Jordi Puig,
  • Gustavo Gonzalez-Granadillo,
  • Juan Mora Zamorano and
  • Ramon Romeu

21 July 2021

Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of cruci...

  • Review
  • Open Access
30 Citations
8,859 Views
45 Pages

A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface

  • Samson O. Oruma,
  • Mary Sánchez-Gordón,
  • Ricardo Colomo-Palacios,
  • Vasileios Gkioulos and
  • Joakim K. Hansen

8 December 2022

There is a growing interest in using social robots in public spaces for indoor and outdoor applications. The threat landscape is an important research area being investigated and debated by various stakeholders. Objectives: This study aims to identif...

  • Article
  • Open Access
715 Views
26 Pages

29 August 2025

Determining how to balance data utilities and data privacy when datasets are released to be utilized outside the scope of data-collecting organizations constitutes a major challenge. To achieve this aim in data collection (datasets), several privacy...

  • Article
  • Open Access
14 Citations
10,269 Views
25 Pages

Privacy-Preserving Federated Learning-Based Intrusion Detection Technique for Cyber-Physical Systems

  • Syeda Aunanya Mahmud,
  • Nazmul Islam,
  • Zahidul Islam,
  • Ziaur Rahman and
  • Sk. Tanzir Mehedi

12 October 2024

The Internet of Things (IoT) has revolutionized various industries, but the increased dependence on all kinds of IoT devices and the sensitive nature of the data accumulated by them pose a formidable threat to privacy and security. While traditional...

  • Article
  • Open Access
27 Citations
8,352 Views
29 Pages

A Multi-Tiered Framework for Insider Threat Prevention

  • Rakan A. Alsowail and
  • Taher Al-Shehari

As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and busines...

  • Article
  • Open Access
16 Citations
5,189 Views
18 Pages

IIoT: Traffic Data Flow Analysis and Modeling Experiment for Smart IoT Devices

  • Akashdeep Bhardwaj,
  • Keshav Kaushik,
  • Salil Bharany,
  • Ateeq Ur Rehman,
  • Yu-Chen Hu,
  • Elsayed Tag Eldin and
  • Nivin A. Ghamry

7 November 2022

The Internet of Things (IoT) has redefined several aspects of our daily lives, including automation and control of the living environment, innovative healthcare services, and much more. Digital IoT devices and sensors, when integrated with home appli...

  • Article
  • Open Access
15 Citations
5,470 Views
32 Pages

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

  • Hisham Ali,
  • Jawad Ahmad,
  • Zakwan Jaroucheh,
  • Pavlos Papadopoulos,
  • Nikolaos Pitropakis,
  • Owen Lo,
  • Will Abramson and
  • William J. Buchanan

28 September 2022

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro...

  • Article
  • Open Access
7 Citations
11,644 Views
22 Pages

A Survey of Bug Bounty Programs in Strengthening Cybersecurity and Privacy in the Blockchain Industry

  • Junaid Arshad,
  • Muhammad Talha,
  • Bilal Saleem,
  • Zoha Shah,
  • Huzaifa Zaman and
  • Zia Muhammad

The increasing reliance on computer networks and blockchain technology has led to a growing concern for cybersecurity and privacy. The emergence of zero-day vulnerabilities and unexpected exploits has highlighted the need for innovative solutions to...

  • Article
  • Open Access
15 Citations
4,497 Views
18 Pages

The Metaverse brings together components of parallel processing computing platforms, the digital development of physical systems, cutting-edge machine learning, and virtual identity to uncover a fully digitalized environment with equal properties to...

  • Article
  • Open Access
5 Citations
2,730 Views
24 Pages

IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System

  • Urooj Akram,
  • Wareesa Sharif,
  • Mobeen Shahroz,
  • Muhammad Faheem Mushtaq,
  • Daniel Gavilanes Aray,
  • Ernesto Bautista Thompson,
  • Isabel de la Torre Diez,
  • Sirojiddin Djuraev and
  • Imran Ashraf

13 July 2023

An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access per...

  • Review
  • Open Access
79 Citations
20,694 Views
46 Pages

State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions

  • Ritika Raj Krishna,
  • Aanchal Priyadarshini,
  • Amitkumar V. Jha,
  • Bhargav Appasani,
  • Avireni Srinivasulu and
  • Nicu Bizon

23 August 2021

The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the...

  • Review
  • Open Access
1 Citations
4,673 Views
46 Pages

6 August 2025

The IoE forms the foundation of the modern digital ecosystem by enabling seamless connectivity and data exchange among smart devices, sensors, and systems. However, the inherent nature of this structure, characterized by high heterogeneity, distribut...

  • Feature Paper
  • Review
  • Open Access
2 Citations
4,510 Views
26 Pages

A Survey on Architectural Approaches for 6G Networks: Implementation Challenges, Current Trends, and Future Directions

  • Panagiotis K. Gkonis,
  • Anastasios Giannopoulos,
  • Nikolaos Nomikos,
  • Panagiotis Trakadas,
  • Lambros Sarakis and
  • Xavi Masip-Bruin

16 April 2025

As the discussions on sixth-generation (6G) wireless networks progress at a rapid pace, various approaches have emerged over the last few years regarding new architectural concepts that can support the 6G vision. Therefore, the goal of this work is t...

  • Concept Paper
  • Open Access
24 Citations
10,141 Views
31 Pages

This paper identifies and discusses the benefits, threats, and vulnerabilities related to the digital revolution. It aims to motivate research and its funding regarding digital threats and vulnerabilities related, in particular, to anticipating unint...

  • Article
  • Open Access
76 Citations
18,392 Views
38 Pages

As Internet of Things (IoT) involvement increases in our daily lives, several security and privacy concerns like linkability, unauthorized conversations, and side-channel attacks are raised. If they are left untouched, such issues may threaten the ex...

  • Review
  • Open Access
37 Citations
4,621 Views
32 Pages

An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)

  • Vasiliki Demertzi,
  • Stavros Demertzis and
  • Konstantinos Demertzis

6 August 2023

The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industri...

  • Article
  • Open Access
1 Citations
3,905 Views
28 Pages

26 March 2025

In recent years, the rapid growth of cryptocurrency markets has highlighted the urgent need for advanced security solutions capable of addressing a spectrum of unique threats, from phishing and wallet hacks to complex blockchain vulnerabilities. This...

  • Article
  • Open Access
89 Citations
28,478 Views
12 Pages

Privacy and Security Issues in Online Social Networks

  • Shaukat Ali,
  • Naveed Islam,
  • Azhar Rauf,
  • Ikram Ud Din,
  • Mohsen Guizani and
  • Joel J. P. C. Rodrigues

22 November 2018

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with...

  • Review
  • Open Access
1,426 Views
23 Pages

A Survey on Privacy Preservation Techniques in IoT Systems

  • Rupinder Kaur,
  • Tiago Rodrigues,
  • Nourin Kadir and
  • Rasha Kashef

14 November 2025

The Internet of Things (IoT) has become deeply embedded in modern society, enabling applications across smart homes, healthcare, industrial automation, and environmental monitoring. However, as billions of interconnected devices continuously collect...

of 15