[PDF][PDF] Probe-IoT: A public digital ledger based forensic investigation framework for IoT.
Poster Abstract—The increased deployment of Internet of Things (IoT) devices will make
them targets for attacks. IoT devices can also be used as tools for committing crimes. In this …
them targets for attacks. IoT devices can also be used as tools for committing crimes. In this …
HADS: Hybrid anomaly detection system for IoT environments
IoT (Internet of Things) devices are rapidly becoming popular in residential environments,
but security is still a big concern in this ecosystem. The fast growth of IoT devices in homes …
but security is still a big concern in this ecosystem. The fast growth of IoT devices in homes …
A graph neural network method for distributed anomaly detection in IoT
A Protogerou, S Papadopoulos, A Drosou, D Tzovaras… - Evolving Systems, 2021 - Springer
Recent IoT proliferation has undeniably affected the way organizational activities and
business procedures take place within several IoT domains such as smart manufacturing …
business procedures take place within several IoT domains such as smart manufacturing …
Towards a secure behavior modeling for iot networks using blockchain
Internet of Things (IoT) occupies a vital aspect of our everyday lives. IoT networks composed
of smart-devices which communicate and transfer the information without the physical …
of smart-devices which communicate and transfer the information without the physical …
A deep learning approach for detecting security attacks on blockchain
In these last years, Blockchain technologies have been widely used in several application
fields to improve data privacy and trustworthiness and security of systems. Although the …
fields to improve data privacy and trustworthiness and security of systems. Although the …
Robust attack detection approach for IIoT using ensemble classifier
Generally, the risks associated with malicious threats are increasing for the IIoT and its
related applications due to dependency on the Internet and the minimal resource availability …
related applications due to dependency on the Internet and the minimal resource availability …
Self-supervised online and lightweight anomaly and event detection for IoT devices
The increasing number of Internet of Things (IoT) devices and low-cost sensors have
facilitated developments in large-scale monitoring applications. However, the accuracy of …
facilitated developments in large-scale monitoring applications. However, the accuracy of …
Chained anomaly detection models for federated learning: An intrusion detection case study
The adoption of machine learning and deep learning is on the rise in the cybersecurity
domain where these AI methods help strengthen traditional system monitoring and threat …
domain where these AI methods help strengthen traditional system monitoring and threat …
Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection
The increase of the computational power in edge devices has enabled the penetration of
distributed machine learning technologies such as federated learning, which allows to build …
distributed machine learning technologies such as federated learning, which allows to build …
Adriot: An edge-assisted anomaly detection framework against iot-based network attacks
Internet of Things (IoT) has entered a stage of rapid development and increasing
deployment. Meanwhile, these low-power devices typically cannot support complex security …
deployment. Meanwhile, these low-power devices typically cannot support complex security …