[HTML][HTML] Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review
M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
Machine learning for anomaly detection: A systematic review
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …
components from data. Many techniques have been used to detect anomalies. One of the …
Zero touch management: A survey of network automation solutions for 5G and 6G networks
E Coronado, R Behravesh… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Mobile networks are facing an unprecedented demand for high-speed connectivity
originating from novel mobile applications and services and, in general, from the adoption …
originating from novel mobile applications and services and, in general, from the adoption …
Future Horizons: AI-Enhanced Threat Detection in Cloud Environments: Unveiling Opportunities for Research
In this extensive and comprehensive review paper, we delve into the dynamic landscape of
artificial intelligence (AI)-enhanced threat detection within cloud environments. The …
artificial intelligence (AI)-enhanced threat detection within cloud environments. The …
Machine learning in network anomaly detection: A survey
S Wang, JF Balarezo, S Kandeepan… - IEEE …, 2021 - ieeexplore.ieee.org
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …
networks against malicious access is always challenging even though it has been studied …
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review
M Nuaimi, LC Fourati, BB Hamed - Journal of Network and Computer …, 2023 - Elsevier
Recently years, we have seen the exponential upgrowth of the Industrial Internet of Things
(IIoT), which brings significant benefits to our daily lives, industry, and society. The common …
(IIoT), which brings significant benefits to our daily lives, industry, and society. The common …
Zero-day attack detection: a systematic literature review
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …
[HTML][HTML] A comprehensive study of anomaly detection schemes in IoT networks using machine learning algorithms
The Internet of Things (IoT) consists of a massive number of smart devices capable of data
collection, storage, processing, and communication. The adoption of the IoT has brought …
collection, storage, processing, and communication. The adoption of the IoT has brought …
[HTML][HTML] A survey of AI-based anomaly detection in IoT and sensor networks
Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly
detection (AD). With the rapid increase in the number of Internet-connected devices, the …
detection (AD). With the rapid increase in the number of Internet-connected devices, the …
Review of artificial intelligence for enhancing intrusion detection in the internet of things
Internet of Things is shaping the quality of living standard. With the rapid growth and
expansion of adopting IoT-based approaches, their security represents a growing challenge …
expansion of adopting IoT-based approaches, their security represents a growing challenge …