[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
Survey on Unified Threat Management (UTM) Systems for Home Networks
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …
professional network administration support, while sophisticated attacks pose enormous …
Current trends in AI and ML for cybersecurity: A state-of-the-art survey
N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges
Abstract The Internet of Things (IoT) scenario places important challenges even for deep
learning-based intrusion detection systems. IoTs are highly heterogeneous networks in …
learning-based intrusion detection systems. IoTs are highly heterogeneous networks in …
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
Impulsando la Neurorehabilitación con Wearables e IoT
C Silva - Interdisciplinary Rehabilitation/Rehabilitacion …, 2023 - ri.saludcyt.ar
Neurorehabilitation is undergoing a transformative revolution with the integration of
wearable devices and the Internet of Things (IoT). This article explores the profound impact …
wearable devices and the Internet of Things (IoT). This article explores the profound impact …
LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network
S Jayashree, SVN Santhosh Kumar - Wireless Networks, 2024 - Springer
Vehicular ad-hoc network (VANET) plays a vital role in emerging Intelligent Transportation
System (ITS). VANET's deal with the group of network that are designed in ad-hoc model in …
System (ITS). VANET's deal with the group of network that are designed in ad-hoc model in …
Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data
RW Wardhani, DSC Putranto, U Jo, H Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) against cyber threats is a formidable challenge, and
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …
Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network
S Subramani, M Selvi - Neural Computing and Applications, 2023 - Springer
The intrusion detection systems (IDSs) developed based on classification algorithms for
securing wireless sensor networks (WSNs) are unable to attain the required detection …
securing wireless sensor networks (WSNs) are unable to attain the required detection …
VBQ-Net: a novel vectorization-based boost quantized network model for maximizing the security level of IoT system to prevent intrusions
Data sharing with additional devices across wireless networks is made simple and
advantageous by the Internet of Things (IoT), an emerging technology. However, IoT …
advantageous by the Internet of Things (IoT), an emerging technology. However, IoT …