Skip to main navigation
Skip to search
Skip to main content
United Arab Emirates University Home
Search content at United Arab Emirates University
Home
Research units
Researchers
Projects
Research output
Datasets
Activities
Press/Media
Prizes
Impacts
Securing AIoT Surveillance: Techniques, Challenges, and Solutions
Kiran Khurshid
, Khawar Khurshid
, Muhammad Usman Hadi
,
Mohammad Al Bataineh
,
Nasir Saeed
Department of Electrical and Communication Engineering
Research output
:
Contribution to journal
›
Article
›
peer-review
2
Link opens in a new tab
Citations (Scopus)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Securing AIoT Surveillance: Techniques, Challenges, and Solutions'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Artificial Intelligence of Things (AIoT)
100%
Surveillance Techniques
100%
Industry Practitioners
25%
Security Issues
25%
Internet of Things
25%
Intrusion Detection System
25%
Valuable Insight
25%
Communication Protocol
25%
Technology Support
25%
Real-time Processing
25%
Heterogeneous Devices
25%
Surveillance System
25%
Rapidly Evolving
25%
Artificial Intelligence
25%
Intrusion Prevention System
25%
Lightweight Communication
25%
Comprehensive Survey
25%
Insecurity
25%
Encryption Algorithm
25%
Ethical Considerations
25%
Researcher-practitioner
25%
Robust Security
25%
Security Framework
25%
Edge Computing
25%
Advanced Monitoring
25%
User Trust
25%
Artificial Intelligence Algorithm
25%
New Frontiers
25%
Regulatory Issues
25%
Distributed Processing
25%
Security Technology
25%
Regulatory Compliance
25%
Ethical Regulation
25%
Adversarial Attack
25%
Zero Trust Architecture
25%
Evolving Landscape
25%
Device Vulnerabilities
25%
Advanced Encryption
25%
Complex Security
25%
Compliance Challenges
25%
Computer Science
Artificial Intelligence of Things
100%
Artificial Intelligence
50%
Intrusion Detection System
25%
Security Challenge
25%
Communication Protocol
25%
Future Direction
25%
Intrusion Prevention Systems
25%
Intrusion Detection and Prevention
25%
Ethical Consideration
25%
Security Framework
25%
Edge Computing
25%
Distributed Processing
25%
Security Technology
25%
Regulatory Compliance
25%
Adversarial Machine Learning
25%
Internet-Of-Things
25%
Data Processing
25%