[HTML][HTML] An ensemble deep learning model for cyber threat hunting in industrial internet of things

A Yazdinejad, M Kazemi, RM Parizi… - Digital Communications …, 2023 - Elsevier
By the emergence of the fourth industrial revolution, interconnected devices and sensors
generate large-scale, dynamic, and inharmonious data in Industrial Internet of Things (IIoT) …

Ai in software engineering: A survey on project management applications

T Crawford, S Duong, R Fueston, A Lawani… - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial Intelligence (AI) refers to the intelligence demonstrated by machines, and within the
realm of AI, Machine Learning (ML) stands as a notable subset. ML employs algorithms that …

Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review

S Najafli, A Toroghi Haghighat, B Karasfi - Knowledge and Information …, 2024 - Springer
Abstract The Internet of Things (IoT) has been used in various aspects. Fundamental
security issues must be addressed to accelerate and develop the Internet of Things. An …

Exploring privacy measurement in federated learning

GK Jagarlamudi, A Yazdinejad, RM Parizi… - The Journal of …, 2024 - Springer
Federated learning (FL) is a collaborative artificial intelligence (AI) approach that enables
distributed training of AI models without data sharing, thereby promoting privacy by design …

A bert-based recommender system for secure blockchain-based cyber physical drug supply chain management

A Yazdinejad, E Rabieinejad, T Hasani, G Srivastava - Cluster Computing, 2023 - Springer
Abstract Drug Supply Chain Management (DSCM) can be one of the most affected streams
in healthcare due to pandemics. The delivery of medicine to patients through DSCM is a …

The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

Systemization of Knowledge (SoK)-Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives

S Makar, A Dehghantanha, F Zarrinkalam… - arXiv preprint arXiv …, 2023 - arxiv.org
Recent literature highlights a significant cross-impact between transfer learning and
cybersecurity. Many studies have been conducted on using transfer learning to enhance …

Security and Privacy Enhancing in Blockchain-based IoT Environments via Anonym Auditing

P Khordadpour, S Ahmadi - arXiv preprint arXiv:2403.01356, 2024 - arxiv.org
The integration of blockchain technology in Internet of Things (IoT) environments is a
revolutionary step towards ensuring robust security and enhanced privacy. This paper …

A systematic literature review on insider threats

AP Singh, A Sharma - arXiv preprint arXiv:2212.05347, 2022 - arxiv.org
Insider threats is the most concerned cybersecurity problem which is poorly addressed by
widely used security solutions. Despite the fact that there have been several scientific …

Web3. 0 Security: Privacy Enhancing and Anonym Auditing in Blockchain-based Structures

D Namakshenas - arXiv preprint arXiv:2307.12485, 2023 - arxiv.org
The advent of Web 3.0, underpinned by blockchain technologies, promises to transform the
internet's landscape by empowering individuals with decentralized control over their data …