Abstract is missing.
- Managing CybersecurityCybersecurity Risks of SCADASCADA Networks of Critical InfrastructuresCritical Infrastructures in the IoT EnvironmentStephen Kwamena Aikins. 3-23 [doi]
- Energy-Perceptive Authentication in Virtual Private Networks Using GPSGPS DataN. Ambika. 25-38 [doi]
- Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key CryptographyMatluba Khodjaeva, Muath Obaidat, Douglas Salane. 39-60 [doi]
- Multidisciplinary Intel Fusion Technique for Proactive Cyber-Intelligence Model for the IoTUgur Can Atasoy, Arif Sari. 61-81 [doi]
- Countering the IoT-Powered Volumetric Cyberattacks with Next-Generation Cyber-Firewall: SeddulbahirSeddulbahir \bArif Sari. 83-96 [doi]
- Blockchain Blockchain for Ensuring Security Security , Privacy Privacy , and Trust Trust in IoT IoT Environments: The State of the ArtAhmet Erdem, Sevgi Özkan Yildirim, Pelin Angin. 97-122 [doi]
- A Novel Quantum Encryption and Authentication Framework Integrated with IoTR. Santhiya Devi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Padmapriya Praveenkumar. 123-150 [doi]
- Internet of Things in the Healthcare Sector: Overview of Security and Privacy IssuesSuvini P. Amaraweera, Malka N. Halgamuge. 153-179 [doi]
- A Comparative Study in the Application of IoT in Health Care: Data Security in TelemedicineG. A. Pramesha Chandrasiri, Malka N. Halgamuge, C. Subhashi Jayasekara. 181-202 [doi]
- Trust ManagementTrust Management for Software-Defined Heterogeneous Vehicular Ad Hoc NetworksVehicular Ad hoc NetworksAdnan Mahmood, Wei Emma Zhang, Quan Z. Sheng, Sarah Ali Siddiqui, Abdulwahab Aljubairy. 203-226 [doi]
- A Novel Privacy Preserving Scheme for Cloud-Enabled Internet of Vehicles UsersLeila Benarous, Benamar Kadri. 227-254 [doi]
- Securing Packet Transmission Through Trusted Shortest Network Path Using Fuzzy Forecasting for Mobility of MANET NodesSoham Bandyopadhyay, Sunil Karforma. 255-288 [doi]