A framework for anomaly detection in IoT networks using conditional generative adversarial networks

I Ullah, QH Mahmoud - IEEE Access, 2021 - ieeexplore.ieee.org
While anomaly detection and the related concept of intrusion detection are widely studied,
detecting anomalies in new operating behavior in environments such as the Internet of …

Effective anomaly detection using deep learning in IoT systems

L Aversano, ML Bernardi, M Cimitile… - Wireless …, 2021 - Wiley Online Library
Anomaly detection in network traffic is a hot and ongoing research theme especially when
concerning IoT devices, which are quickly spreading throughout various situations of …

Lightweight collaborative anomaly detection for the IoT using blockchain

Y Mirsky, T Golomb, Y Elovici - Journal of Parallel and Distributed …, 2020 - Elsevier
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …

Anomaly detection in blockchain networks: A comprehensive survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2022 - ieeexplore.ieee.org
Over the past decade, blockchain technology has attracted a huge attention from both
industry and academia because it can be integrated with a large number of everyday …

A survey of AI-based anomaly detection in IoT and sensor networks

K DeMedeiros, A Hendawi, M Alvarez - Sensors, 2023 - mdpi.com
Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly
detection (AD). With the rapid increase in the number of Internet-connected devices, the …

Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey

S Ali, Q Li, A Yousafzai - Ad Hoc Networks, 2024 - Elsevier
The industrial internet of things (IIoT) is an evolutionary extension of the traditional Internet of
Things (IoT) into processes and machines for applications in the industrial sector. The IIoT …

Anomaly detection methods for IIoT networks

L Zhou, H Guo - … on Service Operations and Logistics, and …, 2018 - ieeexplore.ieee.org
IIoT networks are different from general IT networks such as office or business networks
where multiple various types of applications, protocols and traffic profiles are presented, and …

Federated deep learning for anomaly detection in the internet of things

X Wang, Y Wang, Z Javaheri, L Almutairi… - Computers and …, 2023 - Elsevier
Privacy has emerged as a top worry as a result of the development of zero-day hacks
because IoT devices produce and transmit sensitive information through the regular internet …

CIoTA: Collaborative IoT anomaly detection via blockchain

T Golomb, Y Mirsky, Y Elovici - arXiv preprint arXiv:1803.03807, 2018 - arxiv.org
Due to their rapid growth and deployment, Internet of things (IoT) devices have become a
central aspect of our daily lives. However, they tend to have many vulnerabilities which can …

Classifying security attacks in IoT networks using supervised learning

C Ioannou, V Vassiliou - 2019 15th International conference on …, 2019 - ieeexplore.ieee.org
Machine learning models have long be proposed to detect the presence of unauthorized
activity within computer networks. They are used as anomaly detection techniques to detect …