Internet of Things intrusion detection systems: a comprehensive review and future directions
A Heidari, MA Jabraeil Jamali - Cluster Computing, 2023 - Springer
Abstract The Internet of Things (IoT) is a paradigm that connects objects to the Internet as a
whole and enables them to work together to achieve common objectives, such as innovative …
whole and enables them to work together to achieve common objectives, such as innovative …
Internet of things (IoT) security dataset evolution: Challenges and future directions
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …
A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things
H Xu, Z Sun, Y Cao, H Bilal - Soft Computing, 2023 - Springer
Cyber-attacks and network intrusion have surfaced as major concerns for modern days
applications of the Internet of Things (IoT). The existing intrusion detection and prevention …
applications of the Internet of Things (IoT). The existing intrusion detection and prevention …
[HTML][HTML] Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges
Abstract The application of Machine Learning (ML) techniques to the well-known intrusion
detection systems (IDS) is key to cope with increasingly sophisticated cybersecurity attacks …
detection systems (IDS) is key to cope with increasingly sophisticated cybersecurity attacks …
IoT intrusion detection using machine learning with a novel high performing feature selection method
The Internet of Things (IoT) ecosystem has experienced significant growth in data traffic and
consequently high dimensionality. Intrusion Detection Systems (IDSs) are essential self …
consequently high dimensionality. Intrusion Detection Systems (IDSs) are essential self …
MQTTset, a new dataset for machine learning techniques on MQTT
IoT networks are increasingly popular nowadays to monitor critical environments of different
nature, significantly increasing the amount of data exchanged. Due to the huge number of …
nature, significantly increasing the amount of data exchanged. Due to the huge number of …
X-IIoTID: A connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of Things
M Al-Hawawreh, E Sitnikova… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) is a high-value cyber target due to the nature of the
devices and connectivity protocols they deploy. They are easy to compromise and, as they …
devices and connectivity protocols they deploy. They are easy to compromise and, as they …
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems
S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …
requests to gather private data from an edge-computing-based IoT cloud storage system …
A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things
SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …
smart objects (things) that can continuously sense the events in their sensing domain and …
Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …
increase of network data and placed a high computation complexity across various …