Deep learning for anomaly detection in multivariate time series: Approaches, applications, and challenges

G Li, JJ Jung - Information Fusion, 2023 - Elsevier
Anomaly detection has recently been applied to various areas, and several techniques
based on deep learning have been proposed for the analysis of multivariate time series. In …

A comprehensive study of DDoS attacks over IoT network and their countermeasures

P Kumari, AK Jain - Computers & Security, 2023 - Elsevier
IoT offers capabilities to gather information from digital devices, infer from their results, and
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …

DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges

KB Adedeji, AM Abu-Mahfouz, AM Kurien - Journal of Sensor and …, 2023 - mdpi.com
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …

DDoS attacks in Industrial IoT: A survey

S Chaudhary, PK Mishra - Computer Networks, 2023 - Elsevier
As the IoT expands its influence, its effect is becoming macroscopic and pervasive. One of
the most discernible effects is in the industries where it is known as Industrial IoT (IIoT). IIoT …

DDoS attack detection in IoT-based networks using machine learning models: a survey and research directions

AA Alahmadi, M Aljabri, F Alhaidari, DJ Alharthi… - Electronics, 2023 - mdpi.com
With the emergence of technology, the usage of IoT (Internet of Things) devices is said to be
increasing in people's lives. Such devices can benefit the average individual, who does not …

Hybrid VGG19 and 2D-CNN for intrusion detection in the FOG-cloud environment

A Binbusayyis - Expert Systems with Applications, 2024 - Elsevier
Fog computing (FC) extends cloud technology by providing services, storage, and network
interaction between data centers and end devices. By putting storage and processing closer …

Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

P Shukla, CR Krishna, NV Patil - The Journal of Supercomputing, 2024 - Springer
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …

Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments

MR Kadri, A Abdelli, L Mokdad - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) has emerged over the past ten years as the newest
technology trend that is luring researchers and developers from every sector of industry and …

Energy and task completion time minimization algorithm for UAVs-empowered MEC SYSTEM

M Asim, WK Mashwani, AA Abd El-Latif - … Computing: Informatics and …, 2022 - Elsevier
This paper presents an energy and task completion time minimization scheme for the
unmanned aerial vehicles (UAVs)-empowered mobile edge computing (MEC) system …

Anomaly detection using deep convolutional generative adversarial networks in the internet of things

AK Mishra, S Paliwal, G Srivastava - ISA transactions, 2024 - Elsevier
Advanced 5 G and 6 G technologies have accelerated the adoption of the Internet of Things
(IoT) and are a priority in providing support for high-speed communication and fast data …