Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions
… in computer networks and Internet of Things (IoT) networks … Consequently, security issues
have also been arisen with the … challenges and possible solutions for networks security and …
have also been arisen with the … challenges and possible solutions for networks security and …
Deep-learning-enabled security issues in the internet of things
Z Lv, L Qiao, J Li, H Song - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… To address attacks and other security challenges in the IoT, IDSs (IDS) are distributed in each
… , “Mobile Internet of Things under data physical fusion technology,” IEEE Internet Things J., …
… , “Mobile Internet of Things under data physical fusion technology,” IEEE Internet Things J., …
Internet of Things architecture challenges: A systematic review
T Samizadeh Nikoui, AM Rahmani… - International Journal …, 2021 - Wiley Online Library
… reviewed studies that focus on security challenge. … security concern is an important challenge,
but this issue is not addressed in this paper. As a solution to deal with security challenges …
but this issue is not addressed in this paper. As a solution to deal with security challenges …
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
… The things are heterogeneous and have low memory, less processing power. The … comes
with security and privacy challenges because traditional based existing security protocols do …
with security and privacy challenges because traditional based existing security protocols do …
[PDF][PDF] Towards Security Challenges to Internet-of-Things: Big Data, Networks, and Applications
… security challenges. The recent studies done in this domain present several solutions for
the challenges in Internet-of-Things (IoT) and suggest means to improve decision making for …
the challenges in Internet-of-Things (IoT) and suggest means to improve decision making for …
A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues
M Stoyanova, Y Nikoloudakis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… security challenges. Furthermore, this work provides an overview of the past and current
theoretical models in the digital forensics science. Special attention is paid to frameworks that …
theoretical models in the digital forensics science. Special attention is paid to frameworks that …
Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions
… In addition, the OWASP Internet of Things project [4,5] provides specific guidance for … the
security challenges associated with the IoT and to allow them to make better security decisions …
security challenges associated with the IoT and to allow them to make better security decisions …
A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… Articles were voted for inclusion when the work covered cyber-security challenges and/or
solutions for Industry 4.0, and it was published before 2020, since that is the year in which this …
solutions for Industry 4.0, and it was published before 2020, since that is the year in which this …
Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions
… security solutions in the IoT environment in Section 4. The … security and privacy approaches
may fail. The dynamic nature of IoT connectivity introduces a new set of security challenges. …
may fail. The dynamic nature of IoT connectivity introduces a new set of security challenges. …
A survey of security and privacy issues in the Internet of Things from the layered context
… The pros and cons of the existing literature that addressed security challenges, issues/attacks
in … The pros and cons of the existing literature that addressed security challenges, issues/…
in … The pros and cons of the existing literature that addressed security challenges, issues/…