Journey from cloud of things to fog of things: Survey, new trends, and research directions

A Chakraborty, M Kumar… - Software: Practice and …, 2023 - Wiley Online Library
With the advent of the Internet of Things (IoT) paradigm, the cloud model is unable to offer
satisfactory services for latency‐sensitive and real‐time applications due to high latency and …

A deep learning approach for intrusion detection in Internet of Things using focal loss function

AS Dina, AB Siddique, D Manivannan - Internet of Things, 2023 - Elsevier
Abstract Internet of Things (IoT) is likely to revolutionize healthcare, energy, education,
transportation, manufacturing, military, agriculture, and other industries. However, for the …

Energy consumption of on-device machine learning models for IoT intrusion detection

N Tekin, A Acar, A Aris, AS Uluagac, VC Gungor - Internet of Things, 2023 - Elsevier
Abstract Recently, Smart Home Systems (SHSs) have gained enormous popularity with the
rapid development of the Internet of Things (IoT) technologies. Besides offering many …

A new concatenated multigraph neural network for iot intrusion detection

T Altaf, X Wang, W Ni, G Yu, RP Liu, R Braun - Internet of Things, 2023 - Elsevier
The last few years have seen a high volume of sophisticated cyber-attacks leading to
financial instability and privacy breaches. This reveals the need for a Network Intrusion …

GOSVM: Gannet optimization based support vector machine for malicious attack detection in cloud environment

M Arunkumar, KA Kumar - International Journal of Information Technology, 2023 - Springer
Cloud computing is the most useful computing technology for the new service progression.
Due to the distributed nature of cloud computing, security threats and cyber attacks are …

Trustworthy Artificial Intelligence Methods for Users' Physical and Environmental Security: A Comprehensive Review

S Szymoniak, F Depta, Ł Karbowiak, M Kubanek - Applied Sciences, 2023 - mdpi.com
Artificial Intelligence is an indispensable element of the modern world, constantly evolving
and contributing to the emergence of new technologies. We meet it in everyday applications …

Blockchain‐Based Secure Localization against Malicious Nodes in IoT‐Based Wireless Sensor Networks Using Federated Learning

GG Gebremariam, J Panda… - … and mobile computing, 2023 - Wiley Online Library
Wireless sensor networks are the core of the Internet of Things and are used in healthcare,
locations, the military, and security. Threats to the security of wireless sensor networks built …

Machine-learning-based vulnerability detection and classification in internet of things device security

SB Hulayyil, S Li, L Xu - Electronics, 2023 - mdpi.com
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are
exploited is increasingly challenging and is one of the key technologies to protect IoT …

Secure framework for IoT applications using Deep Learning in fog Computing

A Chakraborty, M Kumar, N Chaurasia - Journal of Information Security and …, 2023 - Elsevier
An efficient offloading strategy provides a promising solution to latency-sensitive
applications in a cloud fog environment, but the fog computing environment is not fully …

FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks

D Ayesha S, S AB - Proceedings of the 39th Annual Computer Security …, 2023 - dl.acm.org
Securing the Internet of Things is critical for its successful deployment in various industries.
While Machine Learning techniques have shown promise for intrusion detection in the …