An SDN perspective IoT-Fog security: A survey
The utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a
notion that solves cloud computing's limitations by offering low latency to IoT network user …
notion that solves cloud computing's limitations by offering low latency to IoT network user …
[HTML][HTML] DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT
M Vishwakarma, N Kesswani - Decision Analytics Journal, 2022 - Elsevier
The number of people using the Internet of Things (IoT) devices has exploded in recent
years. The instantaneous development in deploying constrained devices in numerous areas …
years. The instantaneous development in deploying constrained devices in numerous areas …
Efficient intrusion detection toward IoT networks using cloud–edge collaboration
Abstract The Internet of Things (IoT) is increasingly utilized in daily life and industrial
production, particularly in critical infrastructures. IoT cybersecurity has an effect on people's …
production, particularly in critical infrastructures. IoT cybersecurity has an effect on people's …
[HTML][HTML] Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things
S Wang, W Xu, Y Liu - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT), as the information carrier of the Internet and
telecommunications networks, is a new network technology comprising physical entities …
telecommunications networks, is a new network technology comprising physical entities …
[HTML][HTML] Trustworthy Artificial Intelligence Methods for Users' Physical and Environmental Security: A Comprehensive Review
S Szymoniak, F Depta, Ł Karbowiak, M Kubanek - Applied Sciences, 2023 - mdpi.com
Artificial Intelligence is an indispensable element of the modern world, constantly evolving
and contributing to the emergence of new technologies. We meet it in everyday applications …
and contributing to the emergence of new technologies. We meet it in everyday applications …
Seagull Optimization-based Feature Selection with Optimal Extreme Learning Machine for Intrusion Detection in Fog Assisted WSN
T Muthu, VK Kalimuthu - Tehnički vjesnik, 2023 - hrcak.srce.hr
Sažetak On the internet, various devices that are connected to the Internet of Things (IoT)
and Wireless Sensor Networks (WSNs) share the resources that they have in accordance …
and Wireless Sensor Networks (WSNs) share the resources that they have in accordance …
[HTML][HTML] Intelligent intrusion detection framework for multi-clouds–IoT environment using swarm-based deep learning classifier
SMT Nizamudeen - Journal of Cloud Computing, 2023 - Springer
In the current era, a tremendous volume of data has been generated by using web
technologies. The association between different devices and services have also been …
technologies. The association between different devices and services have also been …
Machine Learning Based Predictive Model for Intrusion Detection
A software that examines network traffic and searches for inconsistencies is known as an
Intrusion Detection System (IDS). Network changes that seem to be abnormal or unexpected …
Intrusion Detection System (IDS). Network changes that seem to be abnormal or unexpected …
Hierarchical multistep approach for intrusion detection and identification in IoT and Fog computing-based environments
CA de Souza, CB Westphall, JDG Valencio… - Ad Hoc Networks, 2024 - Elsevier
Special security techniques, such as intrusion detection mechanisms, are indispensable in
modern computer systems. With the emergence of the Internet of Things they have become …
modern computer systems. With the emergence of the Internet of Things they have become …
Evolving random weight neural networks based on oversampled-segmented examples for IoT intrusion detection
R Qaddoura, H Faris - The Journal of Supercomputing, 2024 - Springer
The intrusion detection system is responsible for revealing different intrusion activities,
including the denial of service, man-in-middle, Mirai, Scan, and other types of intrusion …
including the denial of service, man-in-middle, Mirai, Scan, and other types of intrusion …