IoT – PYTHON/JAVA
1. Block chain-Enabled Data-Sharing Scheme for Consumer IoT Applications
2. Secured Framework for Privacy Preserving Healthcare Based on Blockchain
3. Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare
4. Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things
5. A Novel Data Security for Hospital Records Management Using Internet of Things
6. Attribute Based Encryption with Privacy Protection and Accountability for Cloud IoT
7. Event Triggered Social Media Chatter: A New Modeling Framework
8. Distributed Fog-Based Caching Solution for Content-Centric Networking in IoT
9. A New Preventive Routing Method Based on Clustering and Location Prediction in the Mobile Internet of Things
10. Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System
11. An Efficient and Secured Multiple Keyword Cloud Data Searching Scheme with Dynamic Encryption Procedure
12. Privacy-Preserving Bilateral Fine-Grained Access Control for Cloud-Enabled Industrial IoT Healthcare
13. Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities over Cloud
14. A Blockchain-Based Framework for IoT Based Secure Identity Management
15. Lightweight Searchable Encryption Protocol for Industrial Internet of Things
16. A Lightweight Anonymous Authentication Protocol for Resource-Constrained Devices in Internet of Things
17. Resource Efficient Real-Time Reliability Model for Multi-Agent IoT Systems
18. Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System
19. Forward Privacy Preservation in IoT-Enabled Healthcare Systems
20. Outsourced Decentralized Multi-Authority Attribute-Based Signature and Its Application in IoT
21. Authorized Keyword Search Over Outsourced Encrypted Data in Cloud Environment
22. Secure Data Sharing: Blockchain-Enabled Data Access Control Framework for IoT
23. A Novel Energy-Efficient Scheme for RPL Attacker Identification in IoT Networks Using Discrete Event Modeling
24. A Novel Resource-Saving and Traceable Tea Production and Supply Chain Based on Blockchain and IoT
25. A QoS-Aware Data Aggregation Strategy for Resource Constrained IoT-Enabled AMI Network in Smart Grid
26. A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications
27. An Integrated Scalable Framework for Cloud and IoT Based Green Healthcare System
28. An Intelligent Approach to Improving the Performance of Threat Detection in IoT
29. Anomaly-Based Intrusion on IoT Networks Using AIGAN – a Generative Adversarial Network
30. Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices
31. APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
32. Blockchain Assisted Data Edge Verification With Consensus Algorithm for Machine Learning Assisted IoT
33. Boosted Barnacles Algorithm Optimizer: Comprehensive Analysis for Social IoT Applications
34. Data Enrichment Toolchain: A Data Linking and Enrichment Platform for Heterogeneous Data
35. Deep Learning of Sparse Patterns in Medical IoT for Efficient Big Data Harnessing
36. Deep Reinforcement Learning-Based Task Offloading and Resource Allocation for Industrial IoT in MEC Federation System
37. Distributed Split Computing System in Cooperative Internet of Things (IoT)
38. EG-Crypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT
39. Enabling IoT Service Classification: A Machine Learning-Based Approach for Handling Classification Issues in Heterogeneous IoT Services
40. Enhancing DDoS Attack Detection Using Snake Optimizer With Ensemble Learning on Internet of Things Environment
41. Enhancing Intrusion Detection in IoT Communications Through ML Model Generalization With a New Dataset IDSAI
42. Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models
43. HDL-NET: A Hybrid Deep Learning Network Model With Intelligent IoT for Detection and Classification of Chronic Kidney Disease
44. High-Efficiency Resource Allocation Scheme Introducing the Concept of Resource Sharing Paths in Industrial IoT
45. Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications
46. Hybrid Optical Wireless Communication for Versatile IoT Applications: Data Rate Improvement and Analysis
47. Internet of Things Based Weekly Crop Pest Prediction by Using Deep Neural Network
48. IoT Network Cybersecurity Assessment With the Associated Random Neural Network
49. IoT Underlying Cellular Uplink Through D2D Communication Principle
50. Location Centric Energy Harvesting Aware Routing Protocol for IoT in Smart Cities
51. MAC Protocol Based IoT Network Intrusion Detection Using Improved Efficient Shuffle Bidirectional COOT Channel Attention Network
52. Modeling of Blockchain Assisted Intrusion Detection on IoT Healthcare System Using Ant Lion Optimizer With Hybrid Deep Learning
53. Neural-Hill: A Novel Algorithm for Efficient Scheduling IoT-Cloud Resource to Maintain Scalability
54. Online Black-Box Modeling for the IoT Digital Twins Through Machine Learning
55. Opportunistic Backscatter Communication Protocol Underlying Energy Harvesting IoT Networks
56. Quantifying IoT Security Parameters: An Assessment Framework
57. Quantum Artificial Hummingbird Algorithm for Feature Selection of Social IoT
58. Securing IoT With Deep Federated Learning: A Trust-Based Malicious Node Identification Approach
59. Security-Aware Provenance for Transparency in IoT Data Propagation
60. TMaLB: A Tolerable Many-Objective Load Balancing Technique for IoT Workflows Allocation
61. Toward Design of Internet of Things and Machine Learning-Enabled Frameworks for Analysis and Prediction of Water Quality
62. Toward Secured IoT-Based Smart Systems Using Machine Learning