A feature selection-based method for DDoS attack flow classification
Abstract Distributed Denial of Service (DDoS) attacks still be a great threat to the availability
of online servers. To defend against attacks, the challenge is not only detecting DDoS …
of online servers. To defend against attacks, the challenge is not only detecting DDoS …
[PDF][PDF] Anomaly Detection for Internet of Things Cyberattacks.
M Alanazi, A Aljuhani - Computers, Materials & Continua, 2022 - researchgate.net
The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of
improving quality of service and facilitating human lives. The IoT revolution has redefined …
improving quality of service and facilitating human lives. The IoT revolution has redefined …
A novel framework design of network intrusion detection based on machine learning techniques
C Zhang, Y Chen, Y Meng, F Ruan… - Security and …, 2021 - Wiley Online Library
Traditional machine learning‐based intrusion detection often only considers a single
algorithm to identify intrusion data, lack of the flexibility method, low detection rate, no …
algorithm to identify intrusion data, lack of the flexibility method, low detection rate, no …
MidSiot: A multistage intrusion detection system for internet of things
N Dat-Thinh, H Xuan-Ninh… - … and Mobile Computing, 2022 - Wiley Online Library
Internet of Things (IoT) has been thriving in recent years, playing an important role in a
multitude of various domains, including industry 4.0, smart transportation, home automation …
multitude of various domains, including industry 4.0, smart transportation, home automation …
An intelligent and explainable SAAS-based Intrusion Detection System for resource-constrained IoMT
A Aljuhani, A Alamri, P Kumar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) has revolutionized healthcare, but its vulnerabilities
demand robust security solutions, especially for resource-constrained devices. In this …
demand robust security solutions, especially for resource-constrained devices. In this …
Empowering cyberattack identification in IoHT networks with neighborhood component-based improvised long short-term memory
Cybersecurity has become an inevitable concern in the healthcare industry due to the rapid
growth of the Internet of Health Things (IoHT). The IoHT is revolutionizing healthcare by …
growth of the Internet of Health Things (IoHT). The IoHT is revolutionizing healthcare by …
A novel feature-selection algorithm in IoT networks for intrusion detection
The Internet of Things (IoT) and network-enabled smart devices are crucial to the digitally
interconnected society of the present day. However, the increased reliance on IoT devices …
interconnected society of the present day. However, the increased reliance on IoT devices …
Detection of security attacks in industrial IoT networks: A blockchain and machine learning approach
H Vargas, C Lozano-Garzon, GA Montoya, Y Donoso - Electronics, 2021 - mdpi.com
Internet of Things (IoT) networks have been integrated into industrial infrastructure schemes,
positioning themselves as devices that communicate highly classified information for the …
positioning themselves as devices that communicate highly classified information for the …
Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities
YK Saheed, OH Abdulganiyu, TA Tchakoucht - Applied Soft Computing, 2024 - Elsevier
The emergence of smart cities is an example of how new technologies, such as the Internet
of Things (IoT), have facilitated the creation of extensive interconnected and intelligent …
of Things (IoT), have facilitated the creation of extensive interconnected and intelligent …
A comparative analysis of machine learning techniques for IoT intrusion detection
The digital transformation faces tremendous security challenges. In particular, the growing
number of cyber-attacks targeting Internet of Things (IoT) systems restates the need for a …
number of cyber-attacks targeting Internet of Things (IoT) systems restates the need for a …