Towards building data analytics benchmarks for IoT intrusion detection
Data analytics projects span all types of domains and applications. Researchers publish
results using certain datasets and classification models. They present results with a …
results using certain datasets and classification models. They present results with a …
A novel deep learning model to secure internet of things in healthcare
Smart and efficient application of DL algorithms in IoT devices can improve operational
efficiency in healthcare, including tracking, monitoring, controlling, and optimization. In this …
efficiency in healthcare, including tracking, monitoring, controlling, and optimization. In this …
Toward a Real‐Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro‐Fuzzy Classifier and SDN Assistance in Fog Computing
The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways.
As a result, a massive volume of data are generated and need to be processed in a short …
As a result, a massive volume of data are generated and need to be processed in a short …
An intrusion detection system for health-care system using machine and deep learning
Purpose One of the important key components of health care–based system is a reliable
intrusion detection system. Traditional techniques are not adequate to handle complex data …
intrusion detection system. Traditional techniques are not adequate to handle complex data …
Potential development on cyberattack and prospect analysis for cybersecurity
Technology and methods on cyberattack and strategy on cybersecurity always develop
simultaneously. Once a knotty method of cyberattack has been created, information security …
simultaneously. Once a knotty method of cyberattack has been created, information security …
Machine-learning-based vulnerability detection and classification in internet of things device security
SB Hulayyil, S Li, L Xu - Electronics, 2023 - mdpi.com
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are
exploited is increasingly challenging and is one of the key technologies to protect IoT …
exploited is increasingly challenging and is one of the key technologies to protect IoT …
Cyber-security threats to IoMT-enabled healthcare systems
S Roobini, M Kavitha, M Sujaritha… - Cognitive Computing for …, 2022 - taylorfrancis.com
The traditional healthcare systems are confronted with new issues as the number of patients
keeps rising. The design of the Internet of Medical Things (IoMT) addresses this problem …
keeps rising. The design of the Internet of Medical Things (IoMT) addresses this problem …
Survey of internet of things (IoT) infrastructures for building energy systems
W Yaïci, K Krishnamurthy, E Entchev… - 2020 Global Internet of …, 2020 - ieeexplore.ieee.org
This paper discusses a revolutionary system of interrelated computing devices and
technologies known as the Internet of Things (IoT), with the objective of improving energy …
technologies known as the Internet of Things (IoT), with the objective of improving energy …
[PDF][PDF] Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review
AHB Alghuraibawi, R Abdullah, S Manickam… - International Journal of …, 2021 - academia.edu
Security network systems have been an increasingly important discipline since the
implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by …
implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by …
On securing iot from deep learning perspective
The extensive growth of the Internet of Things (IoT) has impacted diverse applications,
including smart homes and cities, Intelligent Transport Systems (ITS) and smart factories. IoT …
including smart homes and cities, Intelligent Transport Systems (ITS) and smart factories. IoT …