2022
DOI: 10.1016/j.jss.2022.111475
|View full text |Cite
|
Sign up to set email alerts
|

On the use of artificial intelligence to deal with privacy in IoT systems: A systematic literature review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 142 publications
0
8
0
1
Order By: Relevance
“…Cybersecurity applications can more effectively find helpful information or intelligence in system log data by clustering. Clustering algorithms may be very helpful in resolving IoT security issues, such as identifying outliers, anomalies, signatures, fraud, and cyberattacks, by exposing previously hidden patterns and structures in IoT security data [ 113 ].…”
Section: Resultsmentioning
confidence: 99%
“…Cybersecurity applications can more effectively find helpful information or intelligence in system log data by clustering. Clustering algorithms may be very helpful in resolving IoT security issues, such as identifying outliers, anomalies, signatures, fraud, and cyberattacks, by exposing previously hidden patterns and structures in IoT security data [ 113 ].…”
Section: Resultsmentioning
confidence: 99%
“…al. [24] study investigates the current research on using AI to protect privacy in IoT systems. The review disscuss about important discoveries from past research, like how well AI can find privacy breaches and how privacy protection affects how well IoT systems work.…”
Section: Related Workmentioning
confidence: 99%
“…al. [24]. AI systems can study information and find patterns to give quick warnings about possible problems, so companies can act fast to fix them.…”
Section: Opportunitiesmentioning
confidence: 99%
“…Moreover, IoT implementation in agricultural supply chains places a significant emphasis on security requirements due to the potential risks associated with cyber-attacks and data breaches [50,88]. Security concerns in the agricultural sector extend to three key aspects: authentication, privacy, and access control [49,89].…”
Section: Iot Deployment Requirementsmentioning
confidence: 99%