Security as a service: real-time intrusion detection in internet of things
S Chawla, G Thamilarasu - Proceedings of the Fifth Cybersecurity …, 2018 - dl.acm.org
With the increase in number of Internet connected devices, security and privacy concerns
are the major obstacles impeding the widespread adoption of Internet of Things (IoT) …
are the major obstacles impeding the widespread adoption of Internet of Things (IoT) …
Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices
Cyber-threat protection is today's one of the most challenging research branches of
information technology, while the exponentially increasing number of tiny, connected …
information technology, while the exponentially increasing number of tiny, connected …
Attack identification framework for IoT devices
JMR Danda, C Hota - … Design and Intelligent Applications: Proceedings of …, 2016 - Springer
With the emergence of Internet and embedded computing, Internet of Things (IoT) is
currently becoming an area of interest amongst researches. IoT enable interconnection of …
currently becoming an area of interest amongst researches. IoT enable interconnection of …
Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis
Abstract The Internet of Things (IoT) integrates more than billions of intelligent devices over
the globe with the capability of communicating with other connected devices with little to no …
the globe with the capability of communicating with other connected devices with little to no …
HADIoT: A hierarchical anomaly detection framework for IoT
H Chang, J Feng, C Duan - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things establishes the intimacy between the Internet and the physical world.
Due to portable size, most IoT devices have limited computing and storage capabilities and …
Due to portable size, most IoT devices have limited computing and storage capabilities and …
IotSan: Fortifying the safety of IoT systems
Today's IoT systems include event-driven smart applications (apps) that interact with sensors
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …
and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app …
A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices
M Yu, J Zhuge, M Cao, Z Shi, L Jiang - Future Internet, 2020 - mdpi.com
With the prosperity of the Internet of Things (IoT) industry environment, the variety and
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations
The advent of the Internet of Things (IoT) has revolutionized networks by transforming legacy
dumb devices into smart connected “things”; observing, interacting and impacting the …
dumb devices into smart connected “things”; observing, interacting and impacting the …
Anomaly detection/prediction for the internet of things: State of the art and the future
XX Lin, P Lin, EH Yeh - IEEE Network, 2020 - ieeexplore.ieee.org
Anomaly detection/prediction is the first step to secure IoT systems. It usually relies on wide
domain knowledge to build up the tools to automatically detect/predict abnormal events or …
domain knowledge to build up the tools to automatically detect/predict abnormal events or …
Sentinel: A robust intrusion detection system for IoT networks using kernel-level system information
The concept of Internet of Things (IoT) has changed the way we live by integrating
commodity devices with cyberspace to automate our everyday tasks. Nowadays, IoT devices …
commodity devices with cyberspace to automate our everyday tasks. Nowadays, IoT devices …