This work is licensed under the Creative Commons Attribution 4.0 International License.
Marikyan, D., Papagiannidis, S., & Alamanos, E. (2019). A systematic review of the smart home literature: A user perspective. Technological Forecasting and Social Change, 138, 139-154.MarikyanD.PapagiannidisS.AlamanosE. (2019). A systematic review of the smart home literature: A user perspective. Technological Forecasting and Social Change, 138, 139-154.Search in Google Scholar
Sovacool, B. K., & Del Rio, D. D. F. (2020). Smart home technologies in Europe: A critical review of concepts, benefits, risks and policies. Renewable and sustainable energy reviews, 120, 109663.SovacoolB. K.Del RioD. D. F. (2020). Smart home technologies in Europe: A critical review of concepts, benefits, risks and policies. Renewable and sustainable energy reviews, 120, 109663.Search in Google Scholar
Verma, P., & Sood, S. K. (2018). Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE Internet of Things Journal, 5(3), 1789-1796.VermaP.SoodS. K. (2018). Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE Internet of Things Journal, 5(3), 1789-1796.Search in Google Scholar
Chi, H., Zeng, Q., Du, X., & Yu, J. (2020, June). Cross-app interference threats in smart homes: Categorization, detection and handling. In 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (pp. 411-423). IEEE.ChiH.ZengQ.DuX.YuJ. (2020, June). Cross-app interference threats in smart homes: Categorization, detection and handling. In 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (pp. 411-423). IEEE.Search in Google Scholar
Shareef, H., Ahmed, M. S., Mohamed, A., & Al Hassan, E. (2018). Review on home energy management system considering demand responses, smart technologies, and intelligent controllers. Ieee Access, 6, 24498-24509.ShareefH.AhmedM. S.MohamedA.Al HassanE. (2018). Review on home energy management system considering demand responses, smart technologies, and intelligent controllers. Ieee Access, 6, 24498-24509.Search in Google Scholar
Pradhan, A., Mehta, K., & Findlater, L. (2018, April). “Accessibility Came by Accident” Use of Voice-Controlled Intelligent Personal Assistants by People with Disabilities. In Proceedings of the 2018 CHI Conference on human factors in computing systems (pp. 1-13).PradhanA.MehtaK.FindlaterL. (2018, April). “Accessibility Came by Accident” Use of Voice-Controlled Intelligent Personal Assistants by People with Disabilities. In Proceedings of the 2018 CHI Conference on human factors in computing systems (pp. 1-13).Search in Google Scholar
Baker, S. B., Xiang, W., & Atkinson, I. (2017). Internet of things for smart healthcare: Technologies, challenges, and opportunities. Ieee Access, 5, 26521-26544.BakerS. B.XiangW.AtkinsonI. (2017). Internet of things for smart healthcare: Technologies, challenges, and opportunities. Ieee Access, 5, 26521-26544.Search in Google Scholar
Qian, Y., Jiang, Y., Chen, J., Zhang, Y., Song, J., Zhou, M., & Pustišek, M. (2018). Towards decentralized IoT security enhancement: A blockchain approach. Computers & Electrical Engineering, 72, 266-273.QianY.JiangY.ChenJ.ZhangY.SongJ.ZhouM.PustišekM. (2018). Towards decentralized IoT security enhancement: A blockchain approach. Computers & Electrical Engineering, 72, 266-273.Search in Google Scholar
Alaa, M., Zaidan, A. A., Zaidan, B. B., Talal, M., & Kiah, M. L. M. (2017). A review of smart home applications based on Internet of Things. Journal of network and computer applications, 97, 48-65.AlaaM.ZaidanA. A.ZaidanB. B.TalalM.KiahM. L. M. (2017). A review of smart home applications based on Internet of Things. Journal of network and computer applications, 97, 48-65.Search in Google Scholar
Edu, J. S., Such, J. M., & Suarez-Tangil, G. (2020). Smart home personal assistants: a security and privacy review. ACM Computing Surveys (CSUR), 53(6), 1-36.EduJ. S.SuchJ. M.Suarez-TangilG. (2020). Smart home personal assistants: a security and privacy review. ACM Computing Surveys (CSUR), 53(6), 1-36.Search in Google Scholar
Geneiatakis, D., Kounelis, I., Neisse, R., Nai-Fovino, I., Steri, G., & Baldini, G. (2017, May). Security and privacy issues for an IoT based smart home. In 2017 40th international convention on information and communication technology, electronics and microelectronics (MIPRO) (pp. 1292-1297). IEEE.GeneiatakisD.KounelisI.NeisseR.Nai-FovinoI.SteriG.BaldiniG. (2017, May). Security and privacy issues for an IoT based smart home. In 2017 40th international convention on information and communication technology, electronics and microelectronics (MIPRO) (pp. 1292-1297). IEEE.Search in Google Scholar
Guhr, N., Werth, O., Blacha, P. P. H., & Breitner, M. H. (2020). Privacy concerns in the smart home context. SN Applied Sciences, 2, 1-12.GuhrN.WerthO.BlachaP. P. H.BreitnerM. H. (2020). Privacy concerns in the smart home context. SN Applied Sciences, 2, 1-12.Search in Google Scholar
Zeng, E., & Roesner, F. (2019). Understanding and improving security and privacy in {multi-user} smart homes: A design exploration and {in-home} user study. In 28th USENIX Security Symposium (USENIX Security 19) (pp. 159-176).ZengE.RoesnerF. (2019). Understanding and improving security and privacy in {multi-user} smart homes: A design exploration and {in-home} user study. In 28th USENIX Security Symposium (USENIX Security 19) (pp. 159-176).Search in Google Scholar
Haney, J., Acar, Y., & Furman, S. (2021). “It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 411-428).HaneyJ.AcarY.FurmanS. (2021). “It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security. In 30th USENIX Security Symposium (USENIX Security 21) (pp. 411-428).Search in Google Scholar
Mocrii, D., Chen, Y., & Musilek, P. (2018). IoT-based smart homes: A review of system architecture, software, communications, privacy and security. Internet of Things, 1, 81-98.MocriiD.ChenY.MusilekP. (2018). IoT-based smart homes: A review of system architecture, software, communications, privacy and security. Internet of Things, 1, 81-98.Search in Google Scholar
Duezguen, R., Mayer, P., Berens, B., Beckmann, C., Aldag, L., Mossano, M., … & Strufe, T. (2021, October). How to increase smart home security and privacy risk perception. In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 997-1004). IEEE.DuezguenR.MayerP.BerensB.BeckmannC.AldagL.MossanoM.StrufeT. (2021, October). How to increase smart home security and privacy risk perception. In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 997-1004). IEEE.Search in Google Scholar
Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart home: Challenges and solutions. Journal of cleaner production, 140, 1454-1464.StojkoskaB. L. R.TrivodalievK. V. (2017). A review of Internet of Things for smart home: Challenges and solutions. Journal of cleaner production, 140, 1454-1464.Search in Google Scholar
Hassan, M. M., Uddin, M. Z., Mohamed, A., & Almogren, A. (2018). A robust human activity recognition system using smartphone sensors and deep learning. Future Generation Computer Systems, 81, 307-313.HassanM. M.UddinM. Z.MohamedA.AlmogrenA. (2018). A robust human activity recognition system using smartphone sensors and deep learning. Future Generation Computer Systems, 81, 307-313.Search in Google Scholar
Hargreaves, T., Wilson, C., & Hauxwell-Baldwin, R. (2018). Learning to live in a smart home. Building Research & Information, 46(1), 127-139.HargreavesT.WilsonC.Hauxwell-BaldwinR. (2018). Learning to live in a smart home. Building Research & Information, 46(1), 127-139.Search in Google Scholar
Hui, T. K., Sherratt, R. S., & Sánchez, D. D. (2017). Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies. Future Generation Computer Systems, 76, 358-369.HuiT. K.SherrattR. S.SánchezD. D. (2017). Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies. Future Generation Computer Systems, 76, 358-369.Search in Google Scholar
Al-Ali, A. R., Zualkernan, I. A., Rashid, M., Gupta, R., & AliKarar, M. (2017). A smart home energy management system using IoT and big data analytics approach. IEEE Transactions on Consumer Electronics, 63(4), 426-434.Al-AliA. R.ZualkernanI. A.RashidM.GuptaR.AliKararM. (2017). A smart home energy management system using IoT and big data analytics approach. IEEE Transactions on Consumer Electronics, 63(4), 426-434.Search in Google Scholar
Yang, H., Lee, H., & Zo, H. (2017). User acceptance of smart home services: an extension of the theory of planned behavior. Industrial Management & Data Systems, 117(1), 68-89.YangH.LeeH.ZoH. (2017). User acceptance of smart home services: an extension of the theory of planned behavior. Industrial Management & Data Systems, 117(1), 68-89.Search in Google Scholar
Majumder, S., Aghayi, E., Noferesti, M., Memarzadeh-Tehran, H., Mondal, T., Pang, Z., & Deen, M. J. (2017). Smart homes for elderly healthcare—Recent advances and research challenges. Sensors, 17(11), 2496.MajumderS.AghayiE.NoferestiM.Memarzadeh-TehranH.MondalT.PangZ.DeenM. J. (2017). Smart homes for elderly healthcare—Recent advances and research challenges. Sensors, 17(11), 2496.Search in Google Scholar
Zheng, S., Apthorpe, N., Chetty, M., & Feamster, N. (2018). User perceptions of smart home IoT privacy. Proceedings of the ACM on human-computer interaction, 2(CSCW), 1-20.ZhengS.ApthorpeN.ChettyM.FeamsterN. (2018). User perceptions of smart home IoT privacy. Proceedings of the ACM on human-computer interaction, 2(CSCW), 1-20.Search in Google Scholar
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017, March). Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops) (pp. 618-623). IEEE.DorriA.KanhereS. S.JurdakR.GauravaramP. (2017, March). Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops) (pp. 618-623). IEEE.Search in Google Scholar
Anthi, E., Williams, L., Słowińska, M., Theodorakopoulos, G., & Burnap, P. (2019). A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things Journal, 6(5), 9042-9053.AnthiE.WilliamsL.SłowińskaM.TheodorakopoulosG.BurnapP. (2019). A supervised intrusion detection system for smart home IoT devices. IEEE Internet of Things Journal, 6(5), 9042-9053.Search in Google Scholar
Zeng, E., Mare, S., & Roesner, F. (2017). End user security and privacy concerns with smart homes. In thirteenth symposium on usable privacy and security (SOUPS 2017) (pp. 65-80).ZengE.MareS.RoesnerF. (2017). End user security and privacy concerns with smart homes. In thirteenth symposium on usable privacy and security (SOUPS 2017) (pp. 65-80).Search in Google Scholar
Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT-based smart homes. sensors, 18(3), 817.AliB.AwadA. I. (2018). Cyber and physical security vulnerability assessment for IoT-based smart homes. sensors, 18(3), 817.Search in Google Scholar
Shouran, Z., Ashari, A., & Priyambodo, T. (2019). Internet of things (IoT) of smart home: privacy and security. International Journal of Computer Applications, 182(39), 3-8.ShouranZ.AshariA.PriyambodoT. (2019). Internet of things (IoT) of smart home: privacy and security. International Journal of Computer Applications, 182(39), 3-8.Search in Google Scholar
Mahdiyeh Ebrahimi & Alireza Basiri. (2024). RACEkNN: A hybrid approach for improving the effectiveness of the k-nearest neighbor algorithm. Knowledge-Based Systems112357-112357.MahdiyehEbrahimiAlirezaBasiri (2024). RACEkNN: A hybrid approach for improving the effectiveness of the k-nearest neighbor algorithm. Knowledge-Based Systems112357-112357.Search in Google Scholar
Ziqi Jin,Dongmei Li,Xiaomei Zhang & Zhi Cai. (2024). Research on Dynamic Searchable Encryption Method Based on Bloom Filter. Applied Sciences(8).ZiqiJinDongmeiLiXiaomeiZhangZhiCai (2024). Research on Dynamic Searchable Encryption Method Based on Bloom Filter. Applied Sciences(8).Search in Google Scholar
Yong Wang & Eddie Shahril Ismail. (2024). Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions. Mathematics(15),2375-2375.YongWangEddie ShahrilIsmail (2024). Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions. Mathematics(15),2375-2375.Search in Google Scholar
Peter Aaby,Juanjo Mata De Acuna,Richard Macfarlane & William J. Buchanan. (2019). Privacy Parameter Variation Using RAPPOR on a Malware Dataset. CoRR.PeterAabyJuanjoMataDeAcunaRichardMacfarlaneWilliam J.Buchanan (2019). Privacy Parameter Variation Using RAPPOR on a Malware Dataset. CoRR.Search in Google Scholar
Noura H.,Salman O.,Chehab A. & Couturier R. (2020). Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher. Proceedings - IEEE Symposium on Computers and Communications.NouraH.SalmanO.ChehabA.CouturierR. (2020). Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher. Proceedings - IEEE Symposium on Computers and Communications.Search in Google Scholar