Intrusion detection and prevention in fog based IoT environments: A systematic literature review

CA de Souza, CB Westphall, RB Machado, L Loffi… - Computer Networks, 2022 - Elsevier
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …

[HTML][HTML] A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks

GAL Mukhaini, M Anbar, S Manickam… - Journal of King Saud …, 2024 - Elsevier
Abstract The Internet of Things (IoT) connects daily use devices to the Internet, such as
home appliances, health care equipment, sensors, and industrial devices. Concurrently …

A machine learning classifier for predicting stable MCI patients using gene biomarkers

RH Lin, CC Wang, CW Tung - International Journal of Environmental …, 2022 - mdpi.com
Alzheimer's disease (AD) is a neurodegenerative disorder with an insidious onset and
irreversible condition. Patients with mild cognitive impairment (MCI) are at high risk of …

Detection and classification of novel attacks and anomaly in IoT network using rule based deep learning model

S Chakraborty, SK Pandey, S Maity, L Dey - SN Computer Science, 2024 - Springer
Attackers are now using sophisticated techniques, like polymorphism, to change the attack
pattern for each new attack. Thus, the detection of novel attacks has become the biggest …

Machine Learning‐Based Data Analytics for IoT‐Enabled Industry Automation

SK Pandey, S Vanithamani, P Shahare… - Wireless …, 2022 - Wiley Online Library
The virtual network which is regarded as a bridge between real‐world applications and
computerized systems is termed Internet of Things (IoT). Internet of Things can access the …

Energy efficient and secure information dissemination in heterogeneous wireless sensor networks using machine learning techniques

D Dudeja, SY Hera, NV Doohan… - Wireless …, 2022 - Wiley Online Library
The extensive use of sensor technology in every sphere of life, along with the continuous
digitization of society, makes it realistic to anticipate that the planet will soon be patched with …

COOD: Combined out-of-distribution detection using multiple measures for anomaly & novel class detection in large-scale hierarchical classification

LE Hogeweg, R Gangireddy… - Proceedings of the …, 2024 - openaccess.thecvf.com
High-performing out-of-distribution (OOD) detection both anomaly and novel class is an
important prerequisite for the practical use of classification models. In this paper we focus on …

Machine learning human behavior detection mechanism based on python architecture

J Zhu, SB Goyal, C Verma, MS Raboaca, TC Mihaltan - Mathematics, 2022 - mdpi.com
Human behavior is stimulated by the outside world, and the emotional response caused by it
is a subjective response expressed by the body. Humans generally behave in common …

Feature Selection using Chi Square to Improve Attack Detection Classification in IoT Network: Work in Progress

ZRS Elsi, D Stiawan, AF Oklilas… - 2022 9th …, 2022 - ieeexplore.ieee.org
To maintain network security, Intrusion Detection System (IDS) is needed to detect anomaly
and attack. Designing proper IDS requires accurate model. This paper proposes a model …

Hybrid Fuzzy Rule Algorithm and Trust Planning Mechanism for Robust Trust Management in IoT-Embedded Systems Integration

NVR Reddy, P Padmaja, M Mahdal, S Seerangan… - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) is rapidly expanding and becoming an integral part of daily life,
increasing the potential for security threats such as malware or cyberattacks. Many …