[HTML][HTML] Monitoring real time security attacks for IoT systems using DevSecOps: a systematic literature review
In many enterprises and the private sector, the Internet of Things (IoT) has spread globally.
The growing number of different devices connected to the IoT and their various protocols …
The growing number of different devices connected to the IoT and their various protocols …
Machine learning algorithms for preventing IoT cybersecurity attacks
S Chesney, K Roy, S Khorsandroo - Intelligent Systems and Applications …, 2021 - Springer
The goal of this paper is to understand the effectiveness of machine learning (ML)
algorithms in combatting IoT-related cyber-attacks, with a focus on Denial of Service (DoS) …
algorithms in combatting IoT-related cyber-attacks, with a focus on Denial of Service (DoS) …
A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks
This study explores the growing challenges of cybersecurity in the context of rapidly adopted
Internet of Things (IoT) technologies, which have become increasingly susceptible to cyber …
Internet of Things (IoT) technologies, which have become increasingly susceptible to cyber …
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks
IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration
and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting …
and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting …
[HTML][HTML] IoT multi-vector cyberattack detection based on machine learning algorithms: traffic features analysis, experiments, and efficiency
S Lysenko, K Bobrovnikova, V Kharchenko, O Savenko - Algorithms, 2022 - mdpi.com
Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT
devices has led to a great number of devices being compromised, with threats from both …
devices has led to a great number of devices being compromised, with threats from both …
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments
Abstract The Internet of Things (IoT) has emerged over the past ten years as the newest
technology trend that is luring researchers and developers from every sector of industry and …
technology trend that is luring researchers and developers from every sector of industry and …
[HTML][HTML] The comparison of cybersecurity datasets
A Alshaibi, M Al-Ani, A Al-Azzawi, A Konev… - Data, 2022 - mdpi.com
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer
according to a majority of the sources. In IIoT, different machine learning (ML) and deep …
according to a majority of the sources. In IIoT, different machine learning (ML) and deep …
Machine learning approaches to IoT security: A systematic literature review
With the continuous expansion and evolution of IoT applications, attacks on those IoT
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …
[HTML][HTML] Deep-learning based detection for cyber-attacks in IoT networks: A distributed attack detection framework
The widespread use of smart devices and the numerous security weaknesses of networks
has dramatically increased the number of cyber-attacks in the internet of things (IoT) …
has dramatically increased the number of cyber-attacks in the internet of things (IoT) …
Ensemble learning for detecting attacks and anomalies in IoT smart home
The expansion of the Internet of Things (IoT) has also given rise to an increasing number of
destructive attacks that pose severe threats to exposed IoT devices. As such, IoT …
destructive attacks that pose severe threats to exposed IoT devices. As such, IoT …