Security issues in fog computing for internet of things

DN Kartheek, B Bhushan - Architecture and security issues in fog …, 2020 - igi-global.com
The inherent features of internet of things (IoT) devices, like limited computational power and
storage, lead to a novel platform to efficiently process data. Fog computing came into picture …

[PDF][PDF] A Lightweight Attribute-Based Access Control System for IoT.

S Monir - 2016 - harvest.usask.ca
The evolution of the Internet of things (IoT) has made a significant impact on our daily and
professional life. Home and office automation are now even easier with the implementation …

Denial of Service (DoS) Defences against Adversarial Attacks in IoT Smart Home Networks using Machine Learning Methods

Z Iqbal, A Imran, A Yasin, A Alvi - NUST Journal of Engineering …, 2022 - journals.nust.edu.pk
The availability of information and its integrity and confidentiality are important factors in
information and communication of the system security. The DDoS attack generally means …

A novel forecastive anomaly based botnet revelation framework for competing concerns in internet of things

P Bhatt, B Thakker - Journal of Applied Security Research, 2021 - Taylor & Francis
With internet, billions and millions of devices in Internet of Things (IoT) are interconnected
and are communicated with other devices through messaging bots. The messaging bots are …

Rapid APT detection in resource-constrained IoT devices using global vision federated learning (GV-FL)

H Zhu, H Wang, CT Lam, L Hu, BK Ng… - … Conference on Neural …, 2023 - Springer
Security and privacy are critical concerns in cyberspace due to the inherent vulnerability of
Internet of Things (IoT) systems. In particular, Advanced Persistent Threat (APT) has become …

Classification and intelligent mining of anomalies in Industrial IoT

N Sharghivand, F Derakhshan - AI-Enabled Threat Detection and Security …, 2021 - Springer
While the advent of IIoT has brought significant value and convenience to the industry, it is
accompanied by different security risks including anomalies in the collected data. Anomalies …

Edge mining on iot devices using anomaly detection

K Kamaraj, B Dezfouli, Y Liu - 2019 Asia-Pacific Signal and …, 2019 - ieeexplore.ieee.org
With continuous monitoring and sensing, millions of Internet of Things sensors all over the
world generate tremendous amounts of data every minute. As a result, recent studies start to …

Identification of botnet attacks using hybrid machine learning models

A Pandey, S Thaseen, C Aswani Kumar… - Hybrid Intelligent Systems …, 2021 - Springer
Botnet attacks are the new threat in the world of cyber security. In the last few years with the
rapid growth of IoT based Technology and networking systems connecting large number of …

Imminent threat with authentication methods for AI data using blockchain security

VK Sonthi, S Nagarajan, MVB Murali Krishna M… - Blockchain Security in …, 2022 - Springer
Since the announcement of Satoshi Nakamoto's Bitcoin policy document in 2008,
blockchain has become one of the most widely discussed techniques for implementing …

[PDF][PDF] Detection techniques of data anomalies in IoT: A literature survey

D ElMenshawy, W Helmy - Technology, 2018 - academia.edu
ABSTRACT Internet of Things (IoT) is a new paradigm that has gained popularity few years
ago. IoT refers to the networking of physical objects which contain sensors and software that …