[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models

OBJ Rabie, S Selvarajan, T Hasanin, AM Alshareef… - Scientific Reports, 2024 - nature.com
Abstract The Internet of Things (IoT) is extensively used in modern-day life, such as in smart
homes, intelligent transportation, etc. However, the present security measures cannot fully …

Autonomous and Sustainable Service economies: Data-Driven optimization of Design and Operations through Discovery of Multi-perspective parameters

N Alahmari, R Mehmood, A Alzahrani, T Yigitcanlar… - Sustainability, 2023 - mdpi.com
The rise in the service economy has been fueled by breakthroughs in technology,
globalization, and evolving consumer patterns. However, this sector faces various …

The robust scheme for intrusion detection system in internet of things

DT Nguyen, KH Le - Internet of Things, 2023 - Elsevier
Abstract Machine learning and deep learning-based anomaly intrusion detection systems
(IDSs) have become prevalent in securing IoT networks due to their ability to monitor traffic …

Evaluation of contemporary intrusion detection systems for internet of things environment

V Choudhary, S Tanwar, T Choudhury - Multimedia Tools and …, 2024 - Springer
Abstract Internet of Things (IoT) involves wide-ranging devices connected through the
Internet with an aim to enable coherent communication amongst them without human …

Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JI Iturbe Araya, H Rifà-Pous - Internet of Things, 2023, Vol. 22 …, 2023 - openaccess.uoc.edu
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments

CA de Souza, CB Westphall, JDG Valencio… - Ad Hoc Networks, 2024 - Elsevier
Special security techniques, such as intrusion detection mechanisms, are indispensable in
modern computer systems. With the emergence of the Internet of Things they have become …

Towards an attention-based threat detection system for iot networks

TN Nguyen, KM Dang, AD Tran, KH Le - International Conference on …, 2022 - Springer
The proliferation of the Internet of Things (IoT) serves demands in our life ranging from smart
homes and smart cities to manufacturing and many other industries. As a result of the …

Towards generating semi-synthetic datasets for network intrusion detection system

NT Nguyen, TN Le, KH Le-Minh… - 2023 International …, 2023 - ieeexplore.ieee.org
We have witnessed the proliferation of machine learning and its applications, especially in
network-based intrusion detection systems (NIDS). With the ability to learn complex …

Generation & evaluation of datasets for anomaly-based intrusion detection systems in IoT environments

V Choudhary, S Tanwar - Multimedia Tools and Applications, 2024 - Springer
Abstract The Internet of Things (IoT) has garnered significant attention for its diverse
applications, but the proliferation of devices introduces security threats. This paper …