In recent years, the use of the Internet of Things (IoT) has increased exponentially, and cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is Artificial Intelligence (AI), which is used for the development of complex algorithms to protect networks and systems, including IoT systems. However, cyber-attackers have figured out how to exploit AI and have even begun to use adversarial AI in order to carry out cybersecurity attacks. This review paper compiles information from several other surveys and research papers regarding IoT, AI, and attacks with and against AI and explores the relationship between these three topics with the purpose of comprehensively presenting and summarizing relevant literature i...
Due to the expansion of the internet of things and connected devices, cyber security professionals i...
Performance enhancement and cost-effectiveness are the critical factors for most industries. There i...
The rapid increase in malicious cyber-criminal activities has made the field of cybersecurity a cruc...
Even in its infancy, the internet of things (IoT) has enticed most of the modern industrial areas li...
The computational intelligence (CI) based technologies play key roles in campaigning cybersecurity c...
The computational intelligence (CI) based technologies play key roles in campaigning cybersecurity c...
The computational intelligence (CI) based technologies play key roles in campaigning cybersecurity c...
The Internet of Things (IoT) is generally acknowledged as a dramatic change spearheaded by scientist...
Artificial intelligence techniques have grown rapidly in recent years, and their applications in pra...
The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/o...
The Internet of Things (IoT) is a network of interconnected devices and objects that have various fu...
Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolu...
Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolu...
Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolu...
Cyber-attacks present a greater threat to individuals and the security of the modern state in the gl...
Due to the expansion of the internet of things and connected devices, cyber security professionals i...
Performance enhancement and cost-effectiveness are the critical factors for most industries. There i...
The rapid increase in malicious cyber-criminal activities has made the field of cybersecurity a cruc...
Even in its infancy, the internet of things (IoT) has enticed most of the modern industrial areas li...
The computational intelligence (CI) based technologies play key roles in campaigning cybersecurity c...
The computational intelligence (CI) based technologies play key roles in campaigning cybersecurity c...
The computational intelligence (CI) based technologies play key roles in campaigning cybersecurity c...
The Internet of Things (IoT) is generally acknowledged as a dramatic change spearheaded by scientist...
Artificial intelligence techniques have grown rapidly in recent years, and their applications in pra...
The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/o...
The Internet of Things (IoT) is a network of interconnected devices and objects that have various fu...
Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolu...
Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolu...
Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolu...
Cyber-attacks present a greater threat to individuals and the security of the modern state in the gl...
Due to the expansion of the internet of things and connected devices, cyber security professionals i...
Performance enhancement and cost-effectiveness are the critical factors for most industries. There i...
The rapid increase in malicious cyber-criminal activities has made the field of cybersecurity a cruc...