[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Current trends in AI and ML for cybersecurity: A state-of-the-art survey

N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …

Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges

A Rizzardi, S Sicari, AC Porisini - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) scenario places important challenges even for deep
learning-based intrusion detection systems. IoTs are highly heterogeneous networks in …

Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

P Shukla, CR Krishna, NV Patil - The Journal of Supercomputing, 2024 - Springer
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …

Impulsando la Neurorehabilitación con Wearables e IoT

C Silva - Interdisciplinary Rehabilitation/Rehabilitacion …, 2023 - ri.saludcyt.ar
Neurorehabilitation is undergoing a transformative revolution with the integration of
wearable devices and the Internet of Things (IoT). This article explores the profound impact …

LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network

S Jayashree, SVN Santhosh Kumar - Wireless Networks, 2024 - Springer
Vehicular ad-hoc network (VANET) plays a vital role in emerging Intelligent Transportation
System (ITS). VANET's deal with the group of network that are designed in ad-hoc model in …

Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data

RW Wardhani, DSC Putranto, U Jo, H Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) against cyber threats is a formidable challenge, and
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …

Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network

S Subramani, M Selvi - Neural Computing and Applications, 2023 - Springer
The intrusion detection systems (IDSs) developed based on classification algorithms for
securing wireless sensor networks (WSNs) are unable to attain the required detection …

VBQ-Net: a novel vectorization-based boost quantized network model for maximizing the security level of IoT system to prevent intrusions

G Perumal, G Subburayalu, Q Abbas, SM Naqi… - Systems, 2023 - mdpi.com
Data sharing with additional devices across wireless networks is made simple and
advantageous by the Internet of Things (IoT), an emerging technology. However, IoT …