Anomaly detection and privacy preservation in cloud-centric Internet of Things
I Butun, B Kantarci… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Internet of Things (IoT) concept provides a number of opportunities to improve our daily lives
while also creating a potential risk of increasing the vulnerability of personal information to …
while also creating a potential risk of increasing the vulnerability of personal information to …
A graph neural network method for distributed anomaly detection in IoT
A Protogerou, S Papadopoulos, A Drosou, D Tzovaras… - Evolving Systems, 2021 - Springer
Recent IoT proliferation has undeniably affected the way organizational activities and
business procedures take place within several IoT domains such as smart manufacturing …
business procedures take place within several IoT domains such as smart manufacturing …
Idea: A system for efficient failure management in smart iot environments
IoT enabled smart environments are expected to proliferate significantly in the near future,
particularly in the context of monitoring services for wellness living, patient healthcare and …
particularly in the context of monitoring services for wellness living, patient healthcare and …
Internet of Things security and forensics: Challenges and opportunities
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes
interacting autonomously while offering all sorts of services. Wide distribution, openness and …
interacting autonomously while offering all sorts of services. Wide distribution, openness and …
An adaptive deep-ensemble anomaly-based intrusion detection system for the internet of things
K Albulayhi, FT Sheldon - 2021 IEEE World AI IoT Congress …, 2021 - ieeexplore.ieee.org
Nowadays, IoT technology has become an essential part of many aspects of life and
business. Nevertheless, such widespread application has come at the cost of many security …
business. Nevertheless, such widespread application has come at the cost of many security …
Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices
Cyber-threat protection is today's one of the most challenging research branches of
information technology, while the exponentially increasing number of tiny, connected …
information technology, while the exponentially increasing number of tiny, connected …
A survey of AI-based anomaly detection in IoT and sensor networks
Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly
detection (AD). With the rapid increase in the number of Internet-connected devices, the …
detection (AD). With the rapid increase in the number of Internet-connected devices, the …
Smart-troubleshooting connected devices: Concept, challenges and opportunities
Today's digital world and evolving technology has improved the quality of our lives but it has
also come with a number of new threats. In the society of smart-cities and Industry 4.0, where …
also come with a number of new threats. In the society of smart-cities and Industry 4.0, where …
Fault-tolerant iot: A systematic mapping study
MT Moghaddam, H Muccini - … , SERENE 2019, Naples, Italy, September 17 …, 2019 - Springer
A failure may occur at all architectural levels of the Internet of Things (IoT) applications:
sensor and actuator nodes can be missed, network links can be down, and processing and …
sensor and actuator nodes can be missed, network links can be down, and processing and …
Lightweight collaborative anomaly detection for the IoT using blockchain
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …