[HTML][HTML] Adversarial machine learning in IoT from an insider point of view

F Aloraini, A Javed, O Rana, P Burnap - Journal of Information Security and …, 2022 - Elsevier
With the rapid progress and significant successes in various applications, machine learning
has been considered a crucial component in the Internet of Things ecosystem. However …

Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems

H Alqahtani, G Kumar - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This paper delves into the transformative role of machine learning (ML) techniques in
revolutionizing the security of electric and flying vehicles (EnFVs). By exploring key domains …

[HTML][HTML] Realguard: A lightweight network intrusion detection system for IoT gateways

XH Nguyen, XD Nguyen, HH Huynh, KH Le - Sensors, 2022 - mdpi.com
Cyber security has become increasingly challenging due to the proliferation of the Internet of
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …

[HTML][HTML] An efficient deep learning-based skin cancer classifier for an imbalanced dataset

TM Alam, K Shaukat, WA Khan, IA Hameed… - Diagnostics, 2022 - mdpi.com
Efficient skin cancer detection using images is a challenging task in the healthcare domain.
In today's medical practices, skin cancer detection is a time-consuming procedure that may …

[HTML][HTML] Collaborative learning based sybil attack detection in vehicular ad-hoc networks (vanets)

S Azam, M Bibi, R Riaz, SS Rizvi, SJ Kwon - Sensors, 2022 - mdpi.com
Vehicular Ad-hoc network (VANET) is an imminent technology having both exciting
prospects and substantial challenges, especially in terms of security. Due to its distributed …

[HTML][HTML] Secure healthcare record sharing mechanism with blockchain

GQ Butt, TA Sayed, R Riaz, SS Rizvi, A Paul - Applied Sciences, 2022 - mdpi.com
The transfer of information is a demanding issue, particularly due to the presence of a large
number of eavesdroppers on communication channels. Sharing medical service records …

[HTML][HTML] Understanding perspectives on personal data privacy in Internet of Things (IoT): A Systematic Literature Review (SLR)

A Coiduras-Sanagustín, E Manchado-Pérez… - Heliyon, 2024 - cell.com
As the number of Internet users grows, the increase in smart devices interconnected through
the Internet of Things (IoT) have contributed to improvements in the functionality of everyday …

[HTML][HTML] MalHyStack: a hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis

KS Roy, T Ahmed, PB Udas, ME Karim… - Intelligent Systems with …, 2023 - Elsevier
Since the advent of malware, it has reached a toll in this world that exchanges billions of
data daily. Millions of people are victims of it, and the numbers are not decreasing as the …

[HTML][HTML] Ensemble-Based Deep Learning Models for Enhancing IoT Intrusion Detection

A Odeh, A Abu Taleb - Applied Sciences, 2023 - mdpi.com
Cybersecurity finds widespread applications across diverse domains, encompassing
intelligent industrial systems, residential environments, personal gadgets, and automobiles …

[HTML][HTML] Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …