[HTML][HTML] IoT anomaly detection methods and applications: A survey

A Chatterjee, BS Ahmed - Internet of Things, 2022 - Elsevier
Ongoing research on anomaly detection for the Internet of Things (IoT) is a rapidly
expanding field. This growth necessitates an examination of application trends and current …

A systematic literature review of IoT time series anomaly detection solutions

A Sgueglia, A Di Sorbo, CA Visaggio… - Future Generation …, 2022 - Elsevier
The rapid spread of the Internet of Things (IoT) devices has prompted many people and
companies to adopt the IoT paradigm, as this paradigm allows the automation of several …

[HTML][HTML] A systematic literature review on wireless security testbeds in the cyber-physical realm

V Kampourakis, V Gkioulos, S Katsikas - Computers & Security, 2023 - Elsevier
Abstract The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the
convergence of formerly barricaded operational technology systems with modern …

A survey on resilience in the iot: Taxonomy, classification, and discussion of resilience mechanisms

C Berger, P Eichhammer, HP Reiser… - ACM Computing …, 2021 - dl.acm.org
Internet-of-Things (IoT) ecosystems tend to grow both in scale and complexity, as they
consist of a variety of heterogeneous devices that span over multiple architectural IoT layers …

Stealing neural network structure through remote FPGA side-channel analysis

Y Zhang, R Yasaei, H Chen, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Deep Neural Network (DNN) models have been extensively developed by companies for a
wide range of applications. The development of a customized DNN model with great …

[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …

Hardware trojan detection using graph neural networks

R Yasaei, L Chen, SY Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The globalization of the Integrated Circuit (IC) supply chain has moved most of the design,
fabrication, and testing process from a single trusted entity to various untrusted third party …

[HTML][HTML] A model for risk-based adaptive security controls

M Calvo, M Beltrán - Computers & Security, 2022 - Elsevier
Security controls and countermeasures have shifted from static desktop-based and
corporate network environments to heterogeneous, distributed and dynamic environments …

An accurate non-accelerometer-based ppg motion artifact removal technique using cyclegan

AH Afandizadeh Zargari, SAH Aqajari… - ACM Transactions on …, 2023 - dl.acm.org
A photoplethysmography (PPG) is an uncomplicated and inexpensive optical technique
widely used in the healthcare domain to extract valuable health-related information, eg …