A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems

E Benkhelifa, T Welsh… - … communications surveys & …, 2018 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous
nature of devices and protocols in use, the sensitivity of the data contained within, as well as …

A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019 - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

A security monitoring system for internet of things

V Casola, A De Benedictis, A Riccio, D Rivera… - Internet of Things, 2019 - Elsevier
The wide adoption of the Internet of Things (IoT) paradigm in several application domains
has raised new security issues, which should be carefully taken into account to achieve a …

Machine learning techniques for anomaly-based detection system on CSE-CIC-IDS2018 dataset

A Elhanashi, K Gasmi, A Begni, P Dini, Q Zheng… - … on Applications in …, 2022 - Springer
Anomaly-based detection is a novel form of an intrusion detection system, which has
become the focus of many researchers for cybersecurity systems. Data manages most …

Security and interoperability issues with internet of things (IoT) in healthcare industry: A survey

EM Abounassar, P El-Kafrawy… - Security and Privacy …, 2022 - Springer
Recently, public healthcare systems become one of the most pivotal parts in our daily life.
Resulting in an insane increase in Medical data like medical images and patient information …

Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages

W Malaszewski - TASK Quarterly: scientific bulletin of Academic …, 2022 - yadda.icm.edu.pl
The IoT technology is currently used in many areas and marked by growing popularity. On
the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in …

A comparative analysis of emerging approaches for securing java software with Intel SGX

L Coppolino, S D'Antonio, G Mazzeo… - Future Generation …, 2019 - Elsevier
Intel SGX enables developers to protect security critical parts of their application code and
data even from privileged software. This type of protection is needed in all cases where …

[HTML][HTML] Charging Station of Electric Vehicle Based on IoT: A Review

MH Qahtan, EA Mohammed, AJ Ali - Open Access Library Journal, 2022 - scirp.org
At present, humans face the problem of lack of fuel and environmental pollution to reduce
pollution as well as fuel consumption. We have to use electric vehicles, but the spread of …

Privacy preserving intrusion detection via homomorphic encryption

L Sgaglione, L Coppolino, S D'Antonio… - 2019 IEEE 28th …, 2019 - ieeexplore.ieee.org
In the recent years, we are assisting to an undiminished, and unlikely to stop number of
cyber threats, that have increased the organizations/companies interest about security …

InterOpT: A new testing platform based on oneM2M standards for IoT systems

ST Demirel, M Demirel, I Dogru… - … Symposium on Networks …, 2019 - ieeexplore.ieee.org
Nowadays, with the developing technologies, IoT based solutions are increasing day by
day. In the scope of this study, a test platform has been developed to test the IoT solutions …