[HTML][HTML] Deep learning for cyber threat detection in IoT networks: A review
A Aldhaheri, F Alwahedi, MA Ferrag, A Battah - Internet of Things and Cyber …, 2023 - Elsevier
Abstract The Internet of Things (IoT) has revolutionized modern tech with interconnected
smart devices. While these innovations offer unprecedented opportunities, they also …
smart devices. While these innovations offer unprecedented opportunities, they also …
Deep learning for the security of software-defined networks: a review
As the scale and complexity of networks grow rapidly, management, maintenance, and
optimization of them are becoming increasingly challenging tasks for network administrators …
optimization of them are becoming increasingly challenging tasks for network administrators …
[HTML][HTML] A distributed SDN-based intrusion detection system for IoT using optimized forests
K Luo - Plos one, 2023 - journals.plos.org
Along with the expansion of Internet of Things (IoT), the importance of security and intrusion
detection in this network also increases, and the need for new and architecture-specific …
detection in this network also increases, and the need for new and architecture-specific …
[HTML][HTML] Protocol-specific and sensor network-inherited attack detection in IoT using machine learning
For networks with limited resources, such as IoT-enabled smart homes, smart industrial
equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy …
equipment, and urban infrastructures, the Routing Protocol for Low-power and Lossy …
Tactile internet of federated things: Toward fine-grained design of FL-based architecture to meet TIoT demands
O Alnajar, A Barnawi - Computer Networks, 2023 - Elsevier
Abstract The Tactile Internet of Things (TIoT) represents a special class of the Internet of
Things (IoT) that has opened the door for a new generation of agile, highly dynamic …
Things (IoT) that has opened the door for a new generation of agile, highly dynamic …
[HTML][HTML] A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach
Due to the huge number of connected Internet of Things (IoT) devices within a network,
denial of service and flooding attacks on networks are on the rise. IoT devices are disrupted …
denial of service and flooding attacks on networks are on the rise. IoT devices are disrupted …
MAC protocol based IoT network intrusion detection using improved efficient shuffle bidirectional COOT channel attention network
NKS Nayak, B Bhattacharyya - IEEE Access, 2023 - ieeexplore.ieee.org
The IoT networks are customized to work under various smart environments, utilizing diverse
sensors. However, they are vulnerable to several cyberattacks because of their finite …
sensors. However, they are vulnerable to several cyberattacks because of their finite …
An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks
S Kranthi, M Kanchana, M Suneetha - Peer-to-Peer Networking and …, 2023 - Springer
Securing digital data transmission or communication is essential for the growing smart cities.
At the same, malicious vulnerabilities are also enhanced to break the security. Hence …
At the same, malicious vulnerabilities are also enhanced to break the security. Hence …
A Novel Tunicate Swarm Algorithm With Hybrid Deep Learning Enabled Attack Detection for Secure IoT Environment
The Internet of Things (IoT) paradigm has matured and expanded rapidly across many
disciplines. Despite these advancements, IoT networks continue to face an increasing …
disciplines. Despite these advancements, IoT networks continue to face an increasing …
Evaluated bird swarm optimization based on deep belief network (EBSO-DBN) classification technique for IOT network intrusion detection
A Biju, SW Franklin - Automatika, 2024 - Taylor & Francis
Because of the recent development of various intrusion detection systems (IDS), which
defend computer networks from security as well as privacy threats. The confidentiality …
defend computer networks from security as well as privacy threats. The confidentiality …