[HTML][HTML] On the dependability of 6G networks
Sixth-generation communication networks must be highly dependable due to the foreseen
connectivity of critical infrastructures through them. Dependability is a compound metric of …
connectivity of critical infrastructures through them. Dependability is a compound metric of …
[HTML][HTML] A distributed SDN-based intrusion detection system for IoT using optimized forests
K Luo - Plos one, 2023 - journals.plos.org
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion
detection in this network also increases, and the need for new and architecture-specific …
detection in this network also increases, and the need for new and architecture-specific …
[HTML][HTML] Multi-source information fusion: Progress and future
Abstract Multi-Source Information Fusion (MSIF), as a comprehensive interdisciplinary field
based on modern information technology, has gained significant research value and …
based on modern information technology, has gained significant research value and …
An authentication protocol for next generation of constrained Iot systems
S Rostampour, N Bagheri, Y Bendavid… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
With the exponential growth of connected Internet of Things (IoT) devices around the world,
security protection and privacy preservation have risen to the forefront of design and …
security protection and privacy preservation have risen to the forefront of design and …
[HTML][HTML] A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare
Abstract The Internet of Things (IoT) is a universal network to supervise the physical world
through sensors installed on different devices. The network can improve many areas …
through sensors installed on different devices. The network can improve many areas …
[HTML][HTML] Adversarial attacks and defenses on ML-and hardware-based IoT device fingerprinting and identification
In the last years, the number of IoT devices deployed has suffered an undoubted explosion,
reaching the scale of billions. However, some new cybersecurity issues have appeared …
reaching the scale of billions. However, some new cybersecurity issues have appeared …
Cyber resilience framework: Strengthening defenses and enhancing continuity in business security
A AL-Hawamleh - International Journal of Computing and Digital …, 2024 - journal.uob.edu.bh
This study presents a comprehensive Cybersecurity Resilience Framework designed to
fortify organizational defenses against the evolving landscape of cyber threats while …
fortify organizational defenses against the evolving landscape of cyber threats while …
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things
X Feng, H Xia, S Xu, L Xu, R Zhang - Expert Systems with Applications, 2023 - Elsevier
The lack of effective defense resource allocation strategies and reliable multi-agent
collaboration mechanisms lead to the low stability of Deep Reinforcement Learning (DRL) …
collaboration mechanisms lead to the low stability of Deep Reinforcement Learning (DRL) …
AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things
Abstract Internet of Cloud Things (IoCT) is a new era of technology introduced as an
extension to Internet of Things (IoT). IoT itself is a complex and heterogeneous network that …
extension to Internet of Things (IoT). IoT itself is a complex and heterogeneous network that …
[HTML][HTML] Prediction framework on early urine infection in IoT–Fog environment using XGBoost ensemble model
A Gupta, A Singh - Wireless Personal Communications, 2023 - Springer
Urine infections are one of the most prevalent concerns for the healthcare industry that may
impair the functioning of the kidney and other renal organs. As a result, early diagnosis and …
impair the functioning of the kidney and other renal organs. As a result, early diagnosis and …