Network-based detection of mirai botnet using machine learning and feature selection methods
A Al-Qerem, BM Abutahoun, SI Nashwan… - … of Research on …, 2020 - igi-global.com
The spread of IoT devices is significantly increasing worldwide with a low design security
that makes it more easily compromised than desktop computers. This gives rise to the …
that makes it more easily compromised than desktop computers. This gives rise to the …
[PDF][PDF] A survey: Privacy and security to Internet of Things with Cloud Computing
S Jaiswal, MB Chandra - International Journal of Control Theory …, 2017 - researchgate.net
Internet of Things (IoT) is an extremely dynamic and new research field of computer science
and information technology domain. An IOT is multi domain research field which focused …
and information technology domain. An IOT is multi domain research field which focused …
A hybrid approach for anomaly detection in the Internet of Things
M Hosseini, HRS Borojeni - … of the international conference on smart …, 2018 - dl.acm.org
Internet of Things is the next generation of internet that physical things is going to interacts
with together without human interventions. Its presence in different domains and …
with together without human interventions. Its presence in different domains and …
Is there a room for security and privacy in IoT?
Internet of things (IoT) continues to the draw attention of academics and researchers across
the globe, since it represents the future of ubiquitous Computing. This is triggered by number …
the globe, since it represents the future of ubiquitous Computing. This is triggered by number …
Abnormal network flow detection based on application execution patterns from Web of Things (WoT) platforms
Y Yoon, H Jung, H Lee - PloS one, 2018 - journals.plos.org
In this paper, we present a research work on a novel methodology of identifying abnormal
behaviors at the underlying network monitor layer during runtime based on the execution …
behaviors at the underlying network monitor layer during runtime based on the execution …
[HTML][HTML] Securing cloud-enabled smart cities by detecting intrusion using spark-based stacking ensemble of machine learning algorithms
MR Ghazi, NS Raghava - Electronic Research Archive, 2024 - aimspress.com
With the use of cloud computing, which provides the infrastructure necessary for the efficient
delivery of smart city services to every citizen over the internet, intelligent systems may be …
delivery of smart city services to every citizen over the internet, intelligent systems may be …
HSDL-based intelligent threat detection framework for IoT network
D Santhadevi, B Janet - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Abstract Many Internet of Things (IoT) devices are susceptible to cyber-attacks. Attackers can
exploit these flaws using the internet and remote access. An efficient Intelligent threat …
exploit these flaws using the internet and remote access. An efficient Intelligent threat …
Anomaly Detection Fog (ADF): A federated approach for internet of things
M Behniafar, A Mahjur, A Nowroozi - Scientia Iranica, 2023 - scientiairanica.sharif.edu
Heterogeneous data models and resource constraints are the challenging issues of
anomaly detection in Internet of Things. Due to these issues and the complexity of …
anomaly detection in Internet of Things. Due to these issues and the complexity of …
On Augmented Intelligence and Performance Anomaly Detection in Unlabeled OpenWiFi Data
S Kuili, B Kantarci, M Chenier… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Performance degradation of OpenWiFi traffic is a significant problem while provisioning
service to a dense area consisting of thousands of clients operating at the same time …
service to a dense area consisting of thousands of clients operating at the same time …
A Survey on DDoS Attacks from Compromised Devices to Enhance IoT Security
KS Niraja, KK Chennam, R Madana Mohana - … Intelligence in Machine …, 2022 - Springer
Abstract The Internet of Things had made IoT devices for cyber-attacks, and constant rise of
concerns about IoT security is necessary as connectivity between different devices and …
concerns about IoT security is necessary as connectivity between different devices and …