A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
A survey of outlier detection techniques in IoT: Review and classification
The Internet of Things (IoT) is a fact today where a high number of nodes are used for
various applications. From small home networks to large-scale networks, the aim is the …
various applications. From small home networks to large-scale networks, the aim is the …
IoT reliability: a review leading to 5 key research directions
Abstract The Internet of Things (IoT) is rapidly changing the way in which we engage with
technology on a daily basis. The IoT paradigm enables low-resource devices to …
technology on a daily basis. The IoT paradigm enables low-resource devices to …
Enhancing smart home security: anomaly detection and face recognition in smart home IoT devices using logit-boosted CNN models
Internet of Things (IoT) devices for the home have made a lot of people's lives better, but
their popularity has also raised privacy and safety concerns. This study explores the …
their popularity has also raised privacy and safety concerns. This study explores the …
A formally validated authentication algorithm for secure message forwarding in smart home networks
VO Nyangaresi - SN Computer Science, 2022 - Springer
The many devices connected in smart homes increase the attack surfaces from which
adversaries can invade the network. In addition, majority of these smart devices have …
adversaries can invade the network. In addition, majority of these smart devices have …
A fuzzy logic-based approach for fault diagnosis and condition monitoring of industry 4.0 manufacturing processes
Since the introduction of the industry 4.0 paradigm, manufacturing companies are investing
in the development of algorithmic diagnostic solutions for their industrial equipment, relying …
in the development of algorithmic diagnostic solutions for their industrial equipment, relying …
Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks
Internet of things or in short IoT is a network of interconnected entities such as computing
devices, mechanical machines, digital gadgets etc. Cloud based IoT infrastructures are …
devices, mechanical machines, digital gadgets etc. Cloud based IoT infrastructures are …
[HTML][HTML] Anomaly detection with a container-based stream processing framework for industrial internet of things
Online anomaly detection is a key challenge for industrial internet of things (IIoT)
applications, as anomalies may occur in data streams from sensors and cause losses or …
applications, as anomalies may occur in data streams from sensors and cause losses or …
Anomaly detection using machine learning to discover sensor tampering in IoT systems
With the rapid growth of the Internet of Things (IoT) applications in smart regions/cities, for
example, smart healthcare, smart homes/offices, there is an increase in security threats and …
example, smart healthcare, smart homes/offices, there is an increase in security threats and …
A blockchain solution for enhancing cybersecurity defence of IoT
KM Giannoutakis, G Spathoulas… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
The growth of IoT devices during the last decade has led to the development of smart
ecosystems, such as smart homes, prone to cyberattacks. Traditional security methodologies …
ecosystems, such as smart homes, prone to cyberattacks. Traditional security methodologies …