Open Access
ARTICLE
Arshad Mehmmod1,#, Komal Batool1,#, Ahthsham Sajid2,3, Muhammad Mansoor Alam2,3, Mazliham MohD Su’ud3,*, Inam Ullah Khan3
1 Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University, Islamabad, 46000, Pakistan
2 Faculty of Computing, Riphah International University, Islamabad, 46000, Pakistan
3 Faculty of Computing and Informatics, Multimedia University, Cyberjaya, 63100, Malaysia
* Corresponding Author: Mazliham MohD Su’ud. Email:
# These authors contributed equally to this work
(This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.062971
Received 31 December 2024; Accepted 04 March 2025; Published online 22 April 2025
View
Download
Like
A Fuzzy Approach for an IoT-based Automated Employee Performance Appraisal
Jaideep Kaur, Kamaljit KaurA Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security
Changting ShiA Fair Blind Signature Scheme to Revoke Malicious Vehicles in VANETs
Xiaoliang Wang, Jianming Jiang,...A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT
Liang Kou, Yiqi Shi, Liguo Zhang,...