[1] Al-Fuqaha A.,Guizani M.,Mohammadi M.,Aledhari M.,Ayyash M. .2015 .Internet of Things: A survey on enabling technologies, protocols, and applications. ” IEEE Communications Surveys & Tutorials, 17(4) : 2347-2376.
[2] Wang J. C.,Xu J.,Hao S.,Yi W.,Zhong J.,Networks Communication .2022 .The impact of OTA firmware updates on IoT-Deepsense: Behavioral security detection of IoT devices. , : .
[3] Kim Y.,Kum S.,Yu M.,Moon J. .2023 .AI management platform with embedded edge cluster. ” Journal of IoT Security, : .
[4] Hasan H. R.,Salah K.,I. Yaqoob K.,Jayaraman R.,Pesic S.,Omar M. .2022 .Trustworthy IoT data streaming using blockchain and. , : .
[5] M. I. Alghamdi .2022 .A hybrid model for intrusion detection in IoT applications. Wireless Communications and Mobile Computing, : .
[6] Grover S.,Broll B.,Babb D. .2023 .Cybersecurity education in the age of AI: Integrating AI learning into high school curricula. Cybersecurity Journal, : .
[7] Youssef M.,Kong L.,Min X.,Qu Y. .2023 .IoT security challenges in smart cities: A review of security solutions and technologies. ” IEEE Transactions on Services Computing, : .
[8] Hussain A.,Kandan R.,Ong H. H. .2023 .A survey of machine learning techniques for IoT security. Future Generation Computer Systems, : .
[9] Zhao M.,Saba T.,Khan A. R.,Hong S. .2021 .A survey on blockchain technology for IoT security. ” IEEE Internet of Things Journal, : .
[10] Aljhayyish A.,Tajoddin A.,Alftlawi A. .2024 .Enhancing IoT Devices Security with AI: Platform for Proactive Cyberattack Risk Management,”. Journal of Electrical Systems, : .
[11] AlJabri Z.,Huda S. .2023 .A comprehensive review of lightweight authenticated encryption for IoT devices. Wireless Communications and Mobile Computing, 9071969 : .
[12] Sharma S.,Aerosols Atmospheric .2022 .AI verification platform using blockchain with distributed ledger technology (DLT), Nucleation. , : .
[13] Grover S.,Broll B.,Babb D. .2023 .Cybersecurity education in the age of AI: Integrating AI learning into cybersecurity high school curricula. , : .
[14] Yadav S.,Sharma K.,Kumar C.,Arora A. .2021 .Blockchain-based synergistic solution to current cybersecurity frameworks. Multimedia Tools and Applications, : .
[15] Elo M.,T. M. M.,T. M. M.,Improving M. .2021 .IoT federation resiliency with distributed ledger technology. IEEE Access, 9 : 161695-161708.
[16] Saba T.,Khan A. R.,Sadad T.,Hong S. .2022 .Securing the IoT system of smart city against cyber threats using deep learning. Discrete Dynamics in Nature and Society, 1241122 : .
[17] Tejaswi B.,Mannan M.,M. M. .2023 .Youssef, all your IoT devices are belong to us: Security weaknesses in IoT management platforms. , : .
[18] Jiao T. R.,Kong L.,Min X.,Qu Y. .2022 .Blockchain for AI: A disruptive integration. Proceedings of the International Conference, : .
[19] Lourens M. E.,Dabral A. P.,Gangodkar D.,Rathour N.,Tida N.,Chadha A. .2022 .Integration of AI with cybersecurity: A detailed systematic review with practical issues and challenges. , : .
[20] Peterson Y. .2023 .Enhancing IoT security and privacy with trusted execution environments and machine learning. , : .
[21] Kumar S. .2023 .Cybersecurity flood attacks and risk assessment for Internet of Things (IoT) distributed systems. , : .
[22] Bukhary I.,Ismail M. F.,Kandan R.,Ong H. H. .2019 .On-premise AI platform: From DC to edge. , : .
[23] I. Emanuilov .2020 .Security through transparency and openness in computer design. , : .
[24] Koirala A.,Bista R.,Ferreira J. .2023 .Enhancing IoT device security through network attack data analysis using machine learning algorithms. Future Internet, : .
[25] Shelke P. A. .2023 .Enhancing IoT security and privacy with trusted execution environments and machine learning. , : .
[26] Tejaswi B.,Mannan M.,M. M. .2023 .Youssef, all your IoT devices are belong to us: Security weaknesses in IoT management platforms. , : .