Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
RF Mansour - Scientific Reports, 2022 - nature.com
Cyber physical system (CPS) is a network of cyber and physical elements, which interact
with one another in a feedback form. CPS approves critical infrastructure and is treated as …
with one another in a feedback form. CPS approves critical infrastructure and is treated as …
Blockchain-assisted machine learning with hybrid metaheuristics-empowered cyber attack detection and classification model
Cyber attack detection is the process of detecting and responding to malicious or
unauthorized activities in networks, computer systems, and digital environments. The …
unauthorized activities in networks, computer systems, and digital environments. The …
IoT-based blockchain intrusion detection using optimized recurrent neural network
V Saravanan, M Madiajagan, SM Rafee… - Multimedia Tools and …, 2024 - Springer
Abstract In recent years, Intrusion Detection Systems (IDS) monitor the computer network
system by collecting and analyzing data or information by identifying the behavior of the user …
system by collecting and analyzing data or information by identifying the behavior of the user …
Modelling of Blockchain Assisted Intrusion Detection on IoT Healthcare System using Ant Lion Optimizer with Hybrid Deep Learning
An IoT healthcare system refers to the use of Internet of Things (IoT) devices and
technologies in the healthcare industry. It involves the integration of various interconnected …
technologies in the healthcare industry. It involves the integration of various interconnected …
A deep learning integrated blockchain framework for securing industrial IoT
A Aljuhani, P Kumar, R Alanazi… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is a collection of interconnected smart sensors and
actuators with industrial software tools and applications. IIoT aims to enhance manufacturing …
actuators with industrial software tools and applications. IIoT aims to enhance manufacturing …
[PDF][PDF] Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment.
S Kably, T Benbarrad, N Alaoui… - Computers, Materials & …, 2023 - cdn.techscience.cn
Blockchain merges technology with the Internet of Things (IoT) for addressing security and
privacy-related issues. However, conventional blockchain suffers from scalability issues due …
privacy-related issues. However, conventional blockchain suffers from scalability issues due …
Design of Blockchain enabled intrusion detection model for detecting security attacks using deep learning
D Saveetha, G Maragatham - Pattern Recognition Letters, 2022 - Elsevier
Cyber-attacks are getting more sophisticated and nuanced. Intrusion Detection Systems
(IDSs) are commonly used in a variety of networks to assist in the timely detection of …
(IDSs) are commonly used in a variety of networks to assist in the timely detection of …
Blockchain and machine learning-based hybrid IDS to protect smart networks and preserve privacy
S Mishra - Electronics, 2023 - mdpi.com
The cyberspace is a convenient platform for creative, intellectual, and accessible works that
provide a medium for expression and communication. Malware, phishing, ransomware, and …
provide a medium for expression and communication. Malware, phishing, ransomware, and …
A novel metaheuristics with deep learning enabled intrusion detection system for secured smart environment
With the deep integration of Internet and ubiquitous computing, smart environment becomes
familiar in several real time applications such as smart city, smart building, healthcare …
familiar in several real time applications such as smart city, smart building, healthcare …
BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence
T Jiang, G Shen, C Guo, Y Cui, B Xie - Computer Networks, 2023 - Elsevier
Abstract Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …