Emerging iot applications in sustainable smart cities for covid-19: Network security and data preservation challenges with future directions

M Adil, MK Khan - Sustainable Cities and Society, 2021 - Elsevier
COVID-19 is a global infectious disease that can be easily spread by the contiguity of
infected people. To prevent from COVID-19 and reduce its impact in sustainable smart cities …

Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks

A Yazdinejad, A Dehghantanha, RM Parizi… - Computers in …, 2023 - Elsevier
Integrating blockchain into the Internet of Things (IoT) for security is a new development in
computational communication systems. While security threats are changing their strategies …

Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

Anomaly-based intrusion detection system for IoT application

M Bhavsar, K Roy, J Kelly, O Olusola - Discover Internet of things, 2023 - Springer
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …

Passive rule-based approach to detect sinkhole attack in RPL-based internet of things networks

S Al-Sarawi, M Anbar, BA Alabsi, MA Aladaileh… - IEEE …, 2023 - ieeexplore.ieee.org
An Internet of Things (IoT) refers to a network of smart devices that enable data collection
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …

Data transformation schemes for cnn-based network traffic analysis: A survey

J Krupski, W Graniszewski, M Iwanowski - Electronics, 2021 - mdpi.com
The enormous growth of services and data transmitted over the internet, the bloodstream of
modern civilization, has caused a remarkable increase in cyber attack threats. This fact has …

Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments

MR Kadri, A Abdelli, L Mokdad - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) has emerged over the past ten years as the newest
technology trend that is luring researchers and developers from every sector of industry and …

[HTML][HTML] A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks

GAL Mukhaini, M Anbar, S Manickam… - Journal of King Saud …, 2023 - Elsevier
Abstract The Internet of Things (IoT) connects daily use devices to the Internet, such as
home appliances, health care equipment, sensors, and industrial devices. Concurrently …

A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach

A Bahaa, A Sayed, L Elfangary, H Fahmy - Plos one, 2022 - journals.plos.org
Due to the huge number of connected Internet of Things (IoT) devices within a network,
denial of service and flooding attacks on networks are on the rise. IoT devices are disrupted …

AI for DevSecOps: A Landscape and Future Opportunities

M Fu, J Pasuksmit, C Tantithamthavorn - arXiv preprint arXiv:2404.04839, 2024 - arxiv.org
DevOps has emerged as one of the most rapidly evolving software development paradigms.
With the growing concerns surrounding security in software systems, the DevSecOps …