Navigating Connected Car Cybersecurity: Location Anomaly Detection with RAN Data
F Wang, Y Koral, K Futamura - arXiv preprint arXiv:2407.02698, 2024 - arxiv.org
The cybersecurity of connected cars, integral to the broader Internet of Things (IoT)
landscape, has become of paramount concern. Cyber-attacks, including hijacking and …
landscape, has become of paramount concern. Cyber-attacks, including hijacking and …
Securing the Internet of Things in Logistics: Challenges, Solutions, and the Role of Machine Learning in Anomaly Detection
SNU Din, SM Muzammal, R Bibi, M Tayyab… - … for Improved Industry …, 2024 - igi-global.com
Internet of things (IoT), a network of interconnected devices capable of collecting, storing,
analyzing, and transmitting data, has garnered significant attention. Its widespread adoption …
analyzing, and transmitting data, has garnered significant attention. Its widespread adoption …
Deep Learning for Anomaly Detection and Fraud Analysis in Blockchain Transactions of the Open Metaverse
G Airlangga - Jurnal Informatika Ekonomi Bisnis, 2024 - infeb.org
This study investigates the application of deep learning models for anomaly detection and
fraud analysis within blockchain transactions of the Open Metaverse. Given the burgeoning …
fraud analysis within blockchain transactions of the Open Metaverse. Given the burgeoning …
Artificial Intelligence for Anomaly Detection in IoMTs
M Mohammed, O Salem… - … Symposium on Networks …, 2023 - ieeexplore.ieee.org
The exponential development and widespread emergence of the Internet of Medical Things
(IoMT) have led to a growing need for effective anomaly detection techniques to ensure the …
(IoMT) have led to a growing need for effective anomaly detection techniques to ensure the …
Designing a Secure and Lightweight Ecosystem for Internet of Medical Things (IoMT) in Healthcare
MR Joel, V Ebenezer, A Jenefa… - … Trust Architectures in …, 2024 - igi-global.com
The surge in internet of things (IoT) devices, especially in healthcare's internet of medical
things (IoMT), demands a nuanced balance between security and resource constraints. This …
things (IoMT), demands a nuanced balance between security and resource constraints. This …
Improving ML/DL Solutions for Anomaly Detection in IoT Environments
As part of the evolution toward an era of Web 3.0, the Internet of Things (IoT) bridges
physical smart devices to digital world to enhance services for consumer convenience …
physical smart devices to digital world to enhance services for consumer convenience …
Application of Machine Learning for IoT Security: A Step Toward Society 5.0
The research demonstrates the application of machine learning (ML) while keeping the
information security aspect of IoT devices in mind. It explains the significance of the Internet …
information security aspect of IoT devices in mind. It explains the significance of the Internet …
Methods of anomaly detection for the prevention and detection of cyber attacks
N Girubagari, TN Ravi - International Journal of Intelligent …, 2023 - inderscienceonline.com
The idea of the'smart city'has developed in response to the issues brought on by the rapid
growth in urbanisation and population. Smart cities are interconnected. IoT and big data …
growth in urbanisation and population. Smart cities are interconnected. IoT and big data …
Gestion des données de l'Internet des objets axée sur la qualité
M Krichen - 2024 - hal.science
Résumé La prolifération des appareils Internet des objets (IdO) a marqué le début d'une ère
de prise de décision basée sur les données dans divers secteurs. Cet article présente un …
de prise de décision basée sur les données dans divers secteurs. Cet article présente un …
Survey on evolving threats in TCP/IP header attacks: Emerging trends and future directions
W Owoko - World Journal of Advanced Engineering Technology …, 2024 - wjaets.com
The TCP/IP protocol suite, a cornerstone of modern networking, faces escalating threats
from evolving attack vectors targeting its headers. This survey explores emerging trends in …
from evolving attack vectors targeting its headers. This survey explores emerging trends in …