[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review
JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …
the internet, enable remote monitoring, automation, and control. However, collecting …
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Abstract The Internet of Things (IoT) is extensively used in modern-day life, such as in smart
homes, intelligent transportation, etc. However, the present security measures cannot fully …
homes, intelligent transportation, etc. However, the present security measures cannot fully …
Autonomous and Sustainable Service economies: Data-Driven optimization of Design and Operations through Discovery of Multi-perspective parameters
N Alahmari, R Mehmood, A Alzahrani, T Yigitcanlar… - Sustainability, 2023 - mdpi.com
The rise in the service economy has been fueled by breakthroughs in technology,
globalization, and evolving consumer patterns. However, this sector faces various …
globalization, and evolving consumer patterns. However, this sector faces various …
The robust scheme for intrusion detection system in internet of things
Abstract Machine learning and deep learning-based anomaly intrusion detection systems
(IDSs) have become prevalent in securing IoT networks due to their ability to monitor traffic …
(IDSs) have become prevalent in securing IoT networks due to their ability to monitor traffic …
Evaluation of contemporary intrusion detection systems for internet of things environment
Abstract Internet of Things (IoT) involves wide-ranging devices connected through the
Internet with an aim to enable coherent communication amongst them without human …
Internet with an aim to enable coherent communication amongst them without human …
Anomaly-based cyberattacks detection for smart homes: A systematic literature review
JI Iturbe Araya, H Rifà-Pous - Internet of Things, 2023, Vol. 22 …, 2023 - openaccess.uoc.edu
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …
the internet, enable remote monitoring, automation, and control. However, collecting …
Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments
CA de Souza, CB Westphall, JDG Valencio… - Ad Hoc Networks, 2024 - Elsevier
Special security techniques, such as intrusion detection mechanisms, are indispensable in
modern computer systems. With the emergence of the Internet of Things they have become …
modern computer systems. With the emergence of the Internet of Things they have become …
Towards an attention-based threat detection system for iot networks
The proliferation of the Internet of Things (IoT) serves demands in our life ranging from smart
homes and smart cities to manufacturing and many other industries. As a result of the …
homes and smart cities to manufacturing and many other industries. As a result of the …
Towards generating semi-synthetic datasets for network intrusion detection system
NT Nguyen, TN Le, KH Le-Minh… - 2023 International …, 2023 - ieeexplore.ieee.org
We have witnessed the proliferation of machine learning and its applications, especially in
network-based intrusion detection systems (NIDS). With the ability to learn complex …
network-based intrusion detection systems (NIDS). With the ability to learn complex …
Generation & evaluation of datasets for anomaly-based intrusion detection systems in IoT environments
V Choudhary, S Tanwar - Multimedia Tools and Applications, 2024 - Springer
Abstract The Internet of Things (IoT) has garnered significant attention for its diverse
applications, but the proliferation of devices introduces security threats. This paper …
applications, but the proliferation of devices introduces security threats. This paper …