Open Access
ARTICLE
Bello Musa Yakubu1,*, Nor Shahida Mohd Jamail 2, Rabia Latif 2, Seemab Latif 3
1 Department of Cyber Security, Air Force Institute of Technology, Kaduna, 800283, Nigeria
2 College of Computer and Information Sciences, Prince Sultan University, Riyadh, 12435, Saudi Arabia
3 School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, 44000, Pakistan
* Corresponding Author: Bello Musa Yakubu. Email:
(This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.072426
Received 26 August 2025; Accepted 01 October 2025; Published online 10 November 2025
View
Download
Like
Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus
Tehreem Aslam, Ayesha Maqbool,...Droid-IoT: Detect Android IoT Malicious Applications Using ML and Blockchain
Hani Mohammed AlshahraniA Novel Database Watermarking Technique Using Blockchain as Trusted Third Party
Ahmed S. Alghamdi, Surayya Naz,...Blockchain-Based SQKD and IDS in Edge Enabled Smart Grid Network
Abdullah Musaed Alkhiari, Shailendra...Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique
Asif Irshad Khan, Abdullah Saad...