Machine learning based network intrusion detection system for internet of things cybersecurity

PS Molcer, A Pejić, K Gulači, R Szalma - Security-Related Advanced …, 2022 - Springer
The rapid expansion of the IoT devices and the vulnerability of the IoT systems are urging for
investigating threats, improving existing security solutions and adopting new technologies …

Role of Big Data Analytics in the Internet of Things: A Comprehensive Survey

MA Makarem, MA Razaz - 2023 3rd International Conference …, 2023 - ieeexplore.ieee.org
Due to the exponential proliferation of connected devices and the increase in data
consumption rates, there are issues with collecting, processing, analyzing, and preserving …

An Enhanced Side Channel Secured PRESENT Light Weight Cipher for Smart Devices

S Tharini, R Sudhakar - 2023 3rd International Conference …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a community of interconnected gadgets that could alternate
records over the Internet without human intervention. The smart life did have many …

Efficient Data Encryption and Signature Generation Scheme for Resource-Constrained IoT Environments

VD Alagdeve, R Singh, G Vasukidevi… - … Conference on I …, 2023 - ieeexplore.ieee.org
In the proposed work, a unique method for ensuring the safety of healthcare data collected
by Internet of Things (IoT) devices is presented. The use of certificateless cryptography using …

[PDF][PDF] Vulnerabilities, threats and challenges on cyber security and the artificial intelligence based internet of things: A comprehensive study

MA Alanezi - IJCSNS, 2022 - koreascience.kr
Abstract The Internet of Things (IoT) has gotten a lot of research attention in recent years. IoT
is seen as the internet's future. IoT will play a critical role in the future, transforming our …

Particle Swarm Optimization of Deep Auto-Encoder Network Architectures for Anomaly-based Intrusion Detection Systems

QT Tran, VQ Nguyen, TL Ngo - 2023 12th International …, 2023 - ieeexplore.ieee.org
Deep Auto-Encoder (DAE) is a neural network model that is commonly used to develop
anomaly-based network intrusion detection systems. However, the architecture of existing …

Identifying Adversary Impact Using End User Verifiable Key with Permutation Framework

M Anjum, S Shahab, Y Yu, HF Guye - Electronics, 2023 - mdpi.com
In the Internet of Things (IoT), security is a crucial aspect that ensures secure
communication, transactions, and authentication for different applications. In IoT security …

A survey on emerging security issues, challenges, and solutions for Internet of things (IoTs)

A Khan, D Peraković - Advances in Malware and Data-Driven …, 2022 - igi-global.com
The internet of things is a cutting-edge technology that is vulnerable to all sorts of fictitious
solutions. As a new phase of computing emerges in the digital world, it intends to produce a …

Testing IoT Security: A comparison of existing penetration testing frameworks and proposing a generic framework

A Widerberg Palmfeldt, W Mattsson - 2023 - diva-portal.org
Abstract The Internet of Things (IoT) refers to the billions of physical devices linked to the
Internet worldwide, integrating into various systems like healthcare, finance, and …

A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security

EE Eryılmaz, S Akleylek, Y Ertek… - MANAS Journal of …, 2024 - dergipark.org.tr
IIoT “Industrial Internet of Things” refers to a subset of Internet of Things technology
designed for industrial processes and industrial environments. IIoT aims to make …