Emerging iot applications in sustainable smart cities for covid-19: Network security and data preservation challenges with future directions
COVID-19 is a global infectious disease that can be easily spread by the contiguity of
infected people. To prevent from COVID-19 and reduce its impact in sustainable smart cities …
infected people. To prevent from COVID-19 and reduce its impact in sustainable smart cities …
Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks
Integrating blockchain into the Internet of Things (IoT) for security is a new development in
computational communication systems. While security threats are changing their strategies …
computational communication systems. While security threats are changing their strategies …
Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework
T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …
Anomaly-based intrusion detection system for IoT application
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …
has a wide application, such as in transportation, military, healthcare, agriculture, and many …
Passive rule-based approach to detect sinkhole attack in RPL-based internet of things networks
S Al-Sarawi, M Anbar, BA Alabsi, MA Aladaileh… - IEEE …, 2023 - ieeexplore.ieee.org
An Internet of Things (IoT) refers to a network of smart devices that enable data collection
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …
and exchange. RPL is a protocol specifically designed for IPv6 over Low Power Wireless …
Data transformation schemes for cnn-based network traffic analysis: A survey
J Krupski, W Graniszewski, M Iwanowski - Electronics, 2021 - mdpi.com
The enormous growth of services and data transmitted over the internet, the bloodstream of
modern civilization, has caused a remarkable increase in cyber attack threats. This fact has …
modern civilization, has caused a remarkable increase in cyber attack threats. This fact has …
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments
Abstract The Internet of Things (IoT) has emerged over the past ten years as the newest
technology trend that is luring researchers and developers from every sector of industry and …
technology trend that is luring researchers and developers from every sector of industry and …
[HTML][HTML] A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks
GAL Mukhaini, M Anbar, S Manickam… - Journal of King Saud …, 2023 - Elsevier
Abstract The Internet of Things (IoT) connects daily use devices to the Internet, such as
home appliances, health care equipment, sensors, and industrial devices. Concurrently …
home appliances, health care equipment, sensors, and industrial devices. Concurrently …
A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach
Due to the huge number of connected Internet of Things (IoT) devices within a network,
denial of service and flooding attacks on networks are on the rise. IoT devices are disrupted …
denial of service and flooding attacks on networks are on the rise. IoT devices are disrupted …
AI for DevSecOps: A Landscape and Future Opportunities
DevOps has emerged as one of the most rapidly evolving software development paradigms.
With the growing concerns surrounding security in software systems, the DevSecOps …
With the growing concerns surrounding security in software systems, the DevSecOps …