Blockchain on security and forensics management in edge computing for IoT: A comprehensive survey
Z Liao, X Pang, J Zhang, B Xiong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security and forensics represent two key components for network management, especially
to guarantee the trusted operation of massive access networks such as the Internet of Things …
to guarantee the trusted operation of massive access networks such as the Internet of Things …
Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices
Cyber-threat protection is today's one of the most challenging research branches of
information technology, while the exponentially increasing number of tiny, connected …
information technology, while the exponentially increasing number of tiny, connected …
Anomaly behavior analysis for IoT network nodes
The Internet of Things (IoT) will connect not only computers and mobile devices, but it will
also interconnect smart buildings, homes, and cities. The integration of IoT with Fog and …
also interconnect smart buildings, homes, and cities. The integration of IoT with Fog and …
Blockchain-based architecture for secured cyber-attack features exchange
O Ajayi, T Saadawi - 2020 7th IEEE International conference on …, 2020 - ieeexplore.ieee.org
Despite the increased accuracy of intrusion detection systems (IDS) in identifying
cyberattacks in computer networks and devices connected to the internet, distributed or …
cyberattacks in computer networks and devices connected to the internet, distributed or …
[HTML][HTML] Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review
The Internet of Things (IoT) concept has emerged to improve people's lives by providing a
wide range of smart and connected devices and applications in several domains, such as …
wide range of smart and connected devices and applications in several domains, such as …
[HTML][HTML] Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks
There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover,
the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse …
the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse …
Smartretro: Blockchain-based incentives for distributed iot retrospective detection
Internet of Things (IoT) has already been in the period of rapid development and widespread
deployment, while it is still vulnerable to various malicious attacks. Security detection before …
deployment, while it is still vulnerable to various malicious attacks. Security detection before …
[HTML][HTML] Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness
Abstract The Internet of Things (IoT) is a key enabler in closing the loop in Cyber-Physical
Systems, providing “smartness” and thus additional value to each monitored/controlled …
Systems, providing “smartness” and thus additional value to each monitored/controlled …
A framework for anomaly detection in IoT networks using conditional generative adversarial networks
I Ullah, QH Mahmoud - IEEE Access, 2021 - ieeexplore.ieee.org
While anomaly detection and the related concept of intrusion detection are widely studied,
detecting anomalies in new operating behavior in environments such as the Internet of …
detecting anomalies in new operating behavior in environments such as the Internet of …
[HTML][HTML] Scalable anomaly detection in blockchain using graphics processing unit
S Morishima - Computers & Electrical Engineering, 2021 - Elsevier
In blockchain, approved transactions, including illegal ones, cannot be modified unlike
existing bank transactions. To prevent the damage caused by illegal transactions, rapid …
existing bank transactions. To prevent the damage caused by illegal transactions, rapid …