This work is licensed under the Creative Commons Attribution 4.0 International License.
Liu, X., et al. (2018). 5G-based green broadband communication system design with simultaneous wireless information and power transfer. Physical Communication, 28, 130-137.Search in Google Scholar
Ashima, R., Haleem, A., Javaid, M., Rab, S. (2022). Understanding the role and capabilities of Internet of Things-enabled Additive Manufacturing through its application areas. Advanced Industrial and Engineering Polymer Research, 5(3), 137-142.Search in Google Scholar
Rasool, R.U., et al. (2022). Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML. Journal of Network and Computer Applications, 201, 103332.Search in Google Scholar
Cheng, Y. L., Lim, M. H., Hui, K. H. (2022). Impact of internet of things paradigm towards energy consumption prediction: A systematic literature review. Sustainable Cities and Society, 78, 103624.Search in Google Scholar
Hasan, R. and Hasan, R. (2022). Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems. Future generation computer systems, 134, 187-203.Search in Google Scholar
Martins, I., et al. (2022). Host-based IDS: A review and open issues of an anomaly detection system in IoT. Future Generation Computer Systems, 133, 95-113.Search in Google Scholar
Mesmoudi, Y., et al. (2020). A Middleware based on Service Oriented Architecture for Heterogeneity Issues within the Internet of Things (MSOAH-IoT). Journal of King Saud University - Computer and Information Sciences, 32(10), 1108-1116.Search in Google Scholar
Hajar, M. S., Al-Kadri, M. O., Kalutarage, H. K. (2021). A survey on wireless body area networks: Architecture, security challenges and research opportunities. Computers & Security, 104, 102211.Search in Google Scholar
Huanan, Z., Suping, X., & Jiannan, W. (2021). Security and application of wireless sensor network. Procedia Computer Science, 183, 486-492.Search in Google Scholar
Rasool, R.U., et al. (2022). Security and privacy of internet of medical things: A contemporary review in the age of surveillance, botnets, and adversarial ML. Journal of Network and Computer Applications, 201, 103332.Search in Google Scholar
Yu, Y., W. Peng and Lu, J. (2022). Wireless network security game based on conditional privacy policy. Computer Communications, 184, 96-106.Search in Google Scholar
Xiao, X., et al. (2022). Battery-free wireless moisture sensor system for fruit monitoring. Results in Engineering, 14, 100420.Search in Google Scholar
Huanan, Z., Suping, X., Jiannan, W. (2021). Security and application of wireless sensor network. Procedia Computer Science, 183, 486-492.Search in Google Scholar
Hazzaa, F., et al. (2021). Security Scheme Enhancement for Voice over Wireless Networks. Journal of Information Security and Applications, 58, 102798.Search in Google Scholar
Stellios, I., et al. (2018). A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services. IEEE Communications Surveys & Tutorials, 20(4), 3453-3495.Search in Google Scholar
Fragkiadakis, A. G., Tragos, E. Z., Askoxylakis, I. G. (2012). A survey on security threats and detection techniques in cognitive radio networks. IEEE Communications Surveys & Tutorials, 15(1), 428-445.Search in Google Scholar
Eder-Neuhauser, P., et al. (2017). Cyber attack models for smart grid environments. Sustainable Energy, Grids and Networks, 12, 10-29.Search in Google Scholar
Nath, R., Nath, H. V. (2022). Critical analysis of the layered and systematic approaches for understanding IoT security threats and challenges. Computers and Electrical Engineering, 100, 107997.Search in Google Scholar
Samaila, M.G., et al. (2021). Performance evaluation of the SRE and SBPG components of the IoT hardware platform security advisor framework. Computer Networks, 199, 108496.Search in Google Scholar
Cirne, A., et al., (2022). IoT security certifications: Challenges and potential approaches. Computers & Security, 116, 102669.Search in Google Scholar
Prathapchandran, K., Janani, T. (2021). A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST. Computer Networks, 198, 108413.Search in Google Scholar
Tournier, J., et al. (2021). A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things, 16, 100264.Search in Google Scholar
Zhi, Z., Liu, D., Liu, L. (2022). A performance compensation method for GPS/INS integrated navigation system based on CNN–LSTM during GPS outages. Measurement, 188, 110516.Search in Google Scholar
Mousouliotis, P. G., Petrou, L. P. (2020). Cnn-grinder: From algorithmic to high-level synthesis descriptions of cnns for low-end-low-cost fpga socs. Microprocessors and Microsystems, 73, 102990.Search in Google Scholar
Kamalraj, R., et al. (2021). Interpretable filter based convolutional neural network (IF-CNN) for glucose prediction and classification using PD-SS algorithm. Measurement, 183, 109804.Search in Google Scholar
Chen, M., et al. (2022). Improved faster R-CNN for fabric defect detection based on Gabor filter with Genetic Algorithm optimization. Computers in Industry, 134, 103551.Search in Google Scholar
Lindemann, B., et al. (2021). A survey on anomaly detection for technical systems using LSTM networks. Computers in Industry, 131, 103498.Search in Google Scholar
Zheng, X., Chen, W. (2021). An attention-based bi-LSTM method for visual object classification via EEG. Biomedical Signal Processing and Control, 63, 102174.Search in Google Scholar
Su, J., et al. (2021). BERT-hLSTMs: BERT and hierarchical LSTMs for visual storytelling. Computer Speech & Language, 67, 101169.Search in Google Scholar
Yin, J., Ning, C., Tang, T. (2022). Data-driven models for train control dynamics in high-speed railways: LAG-LSTM for train trajectory prediction. Information Sciences, 600, 377-400.Search in Google Scholar