A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems
E Benkhelifa, T Welsh… - … communications surveys & …, 2018 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is rapidly becoming ubiquitous. However the heterogeneous
nature of devices and protocols in use, the sensitivity of the data contained within, as well as …
nature of devices and protocols in use, the sensitivity of the data contained within, as well as …
A comprehensive survey of hardware-assisted security: From the edge to the cloud
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …
control. In the Internet of Things world, for example, the security of data could be posed at …
A security monitoring system for internet of things
The wide adoption of the Internet of Things (IoT) paradigm in several application domains
has raised new security issues, which should be carefully taken into account to achieve a …
has raised new security issues, which should be carefully taken into account to achieve a …
Machine learning techniques for anomaly-based detection system on CSE-CIC-IDS2018 dataset
Anomaly-based detection is a novel form of an intrusion detection system, which has
become the focus of many researchers for cybersecurity systems. Data manages most …
become the focus of many researchers for cybersecurity systems. Data manages most …
Security and interoperability issues with internet of things (IoT) in healthcare industry: A survey
EM Abounassar, P El-Kafrawy… - Security and Privacy …, 2022 - Springer
Recently, public healthcare systems become one of the most pivotal parts in our daily life.
Resulting in an insane increase in Medical data like medical images and patient information …
Resulting in an insane increase in Medical data like medical images and patient information …
Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages
W Malaszewski - TASK Quarterly: scientific bulletin of Academic …, 2022 - yadda.icm.edu.pl
The IoT technology is currently used in many areas and marked by growing popularity. On
the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in …
the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in …
A comparative analysis of emerging approaches for securing java software with Intel SGX
Intel SGX enables developers to protect security critical parts of their application code and
data even from privileged software. This type of protection is needed in all cases where …
data even from privileged software. This type of protection is needed in all cases where …
[HTML][HTML] Charging Station of Electric Vehicle Based on IoT: A Review
At present, humans face the problem of lack of fuel and environmental pollution to reduce
pollution as well as fuel consumption. We have to use electric vehicles, but the spread of …
pollution as well as fuel consumption. We have to use electric vehicles, but the spread of …
Privacy preserving intrusion detection via homomorphic encryption
In the recent years, we are assisting to an undiminished, and unlikely to stop number of
cyber threats, that have increased the organizations/companies interest about security …
cyber threats, that have increased the organizations/companies interest about security …
InterOpT: A new testing platform based on oneM2M standards for IoT systems
ST Demirel, M Demirel, I Dogru… - … Symposium on Networks …, 2019 - ieeexplore.ieee.org
Nowadays, with the developing technologies, IoT based solutions are increasing day by
day. In the scope of this study, a test platform has been developed to test the IoT solutions …
day. In the scope of this study, a test platform has been developed to test the IoT solutions …