[HTML][HTML] Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models

F Alwahedi, A Aldhaheri, MA Ferrag, A Battah… - Internet of Things and …, 2024 - Elsevier
Despite providing unparalleled connectivity and convenience, the exponential growth of the
Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These …

Code injection attacks in wireless-based Internet of Things (IoT): A comprehensive review and practical implementations

HA Noman, OMF Abu-Sharkh - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) has transformed various domains in our lives by enabling
seamless communication and data exchange between interconnected devices …

Privacy attacks and defenses for digital twin migrations in vehicular metaverses

X Luo, J Wen, J Kang, J Nie, Z Xiong, Y Zhang… - IEEE …, 2023 - ieeexplore.ieee.org
The gradual fusion of intelligent transportation systems with metaverse technologies is
giving rise to vehicular metaverses, which blend virtual spaces with physical space. As …

HyperDetect: A Real-Time Hyperdimensional Solution For Intrusion Detection in IoT Networks

J Wang, H Xu, YG Achamyeleh… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Network-based security has emerged as an increasingly critical challenge in the domain of
the Internet of Things (IoT). A number of network intrusion detection systems (NIDS), typically …

[HTML][HTML] Authentication, Access Control and Scalability models in Internet of Things Security-A Review

M Kokila, S Reddy - Cyber Security and Applications, 2024 - Elsevier
Abstract The Internet of Things (IoT) leads to the next phase of human interaction with
technology. With the help of the IoT, physical objects can be given the ability to generate …

Unveiling the Landscape of Operating System Vulnerabilities

M Bhurtel, DB Rawat - Future Internet, 2023 - mdpi.com
Operating systems play a crucial role in computer systems, serving as the fundamental
infrastructure that supports a wide range of applications and services. However, they are …

Decentralized identity with applications to security and privacy for the internet of things

CDN Kyriakidou, AM Papathanasiou… - Computer Networks …, 2023 - ojs.wiserpub.com
Decentralized Identity (dID) has brought to the forefront the advantages and importance of
total user control over identity. Previous solutions delegate identity management to the …

Cyberfusion protocols: Strategic integration of enterprise risk management, ISO 27001, and mobile forensics for advanced digital security in the modern business …

OO Olaniyi, OO Omogoroye… - Journal of …, 2024 - research.sdpublishers.net
This research paper explores the integration of Enterprise Risk Management (ERM), the ISO
27001 standard, and mobile forensics methodologies as a comprehensive framework for …

A Comparative Analysis of Feature Eliminator Methods to Improve Machine Learning Phishing Detection

J Tanimu, S Shiaeles, M Adda - Journal of Data Science and …, 2024 - ojs.bonviewpress.com
This Machine-learning-based phishing detection employs statistical models and algorithms
to assess and recognise phishing attacks. These algorithms can learn patterns and features …

[HTML][HTML] A federated learning-based zero trust intrusion detection system for Internet of Things

D Javeed, MS Saeed, M Adil, P Kumar, A Jolfaei - Ad Hoc Networks, 2024 - Elsevier
The rapid expansion of Internet of Things (IoT) devices presents unique challenges in
ensuring the security and privacy of interconnected systems. As cyberattacks become more …