[HTML][HTML] On the dependability of 6G networks

I Ahmad, F Rodriguez, J Huusko, K Seppänen - Electronics, 2023 - mdpi.com
Sixth-generation communication networks must be highly dependable due to the foreseen
connectivity of critical infrastructures through them. Dependability is a compound metric of …

[HTML][HTML] A distributed SDN-based intrusion detection system for IoT using optimized forests

K Luo - Plos one, 2023 - journals.plos.org
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion
detection in this network also increases, and the need for new and architecture-specific …

[HTML][HTML] Multi-source information fusion: Progress and future

LI Xinde, F DUNKIN, J DEZERT - Chinese Journal of Aeronautics, 2023 - Elsevier
Abstract Multi-Source Information Fusion (MSIF), as a comprehensive interdisciplinary field
based on modern information technology, has gained significant research value and …

An authentication protocol for next generation of constrained Iot systems

S Rostampour, N Bagheri, Y Bendavid… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
With the exponential growth of connected Internet of Things (IoT) devices around the world,
security protection and privacy preservation have risen to the forefront of design and …

[HTML][HTML] A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare

M Hosseinzadeh, J Yoo, S Ali, J Lansky, S Mildeova… - Scientific Reports, 2023 - nature.com
Abstract The Internet of Things (IoT) is a universal network to supervise the physical world
through sensors installed on different devices. The network can improve many areas …

[HTML][HTML] Adversarial attacks and defenses on ML-and hardware-based IoT device fingerprinting and identification

PMS Sánchez, AH Celdrán, G Bovet… - Future Generation …, 2024 - Elsevier
In the last years, the number of IoT devices deployed has suffered an undoubted explosion,
reaching the scale of billions. However, some new cybersecurity issues have appeared …

Cyber resilience framework: Strengthening defenses and enhancing continuity in business security

A AL-Hawamleh - International Journal of Computing and Digital …, 2024 - journal.uob.edu.bh
This study presents a comprehensive Cybersecurity Resilience Framework designed to
fortify organizational defenses against the evolving landscape of cyber threats while …

TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things

X Feng, H Xia, S Xu, L Xu, R Zhang - Expert Systems with Applications, 2023 - Elsevier
The lack of effective defense resource allocation strategies and reliable multi-agent
collaboration mechanisms lead to the low stability of Deep Reinforcement Learning (DRL) …

AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things

KA Awan, IU Din, A Almogren… - Future Generation …, 2022 - Elsevier
Abstract Internet of Cloud Things (IoCT) is a new era of technology introduced as an
extension to Internet of Things (IoT). IoT itself is a complex and heterogeneous network that …

[HTML][HTML] Prediction framework on early urine infection in IoT–Fog environment using XGBoost ensemble model

A Gupta, A Singh - Wireless Personal Communications, 2023 - Springer
Urine infections are one of the most prevalent concerns for the healthcare industry that may
impair the functioning of the kidney and other renal organs. As a result, early diagnosis and …