5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …
have given humans access to interact virtually with objects. Until now, numerous virtual …
Review of botnet attack detection in SDN-enabled IoT Using machine learning
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has
revolutionized the computing fields. These include the broad spectrum of connectivity to …
revolutionized the computing fields. These include the broad spectrum of connectivity to …
Deep ensemble-based efficient framework for network attack detection
Nowadays, networks play a critical role in business, education, and daily life, allowing
people to communicate via different platforms across long distances. However, such …
people to communicate via different platforms across long distances. However, such …
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques
M Gelgi, Y Guan, S Arunachala, M Samba Siva Rao… - Sensors, 2024 - mdpi.com
Internet of Things (IoT) technology has become an inevitable part of our daily lives. With the
increase in usage of IoT Devices, manufacturers continuously develop IoT technology …
increase in usage of IoT Devices, manufacturers continuously develop IoT technology …
A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks
AI techniques for cybersecurity are advancing, but AI-based classifiers are suspectable of
adversarial attacks. It is challenging to quantify the efforts required of an adversary to …
adversarial attacks. It is challenging to quantify the efforts required of an adversary to …
Managing Networked IoT Assets Using Practical and Scalable Traffic Inference
A Pashamokhtari - arXiv preprint arXiv:2310.10657, 2023 - arxiv.org
The Internet has recently witnessed unprecedented growth of a class of connected assets
called the Internet of Things (IoT). Due to relatively immature manufacturing processes and …
called the Internet of Things (IoT). Due to relatively immature manufacturing processes and …
Fuzzy-Based Operational Resilience Modelling
A Ur-Rehman, J Kamruzzuman… - 2022 IEEE 9th …, 2022 - ieeexplore.ieee.org
Resilience is an increasingly important concept in current socio-economic landscapes. Due
to the competitive global context and security attacks, the organisations are looking for …
to the competitive global context and security attacks, the organisations are looking for …
Detection of false data injection in electric energy metering platforms using gradient lifting decision trees and MLP neural networks
Y Zhu, Y Zhang, C Zhang, B Zhang, H Wang… - Discover Applied …, 2025 - Springer
This study investigates a false data injection detection method in an automatic data
acquisition platform for electric energy measurement with the aim of ensuring the stability …
acquisition platform for electric energy measurement with the aim of ensuring the stability …
Cyber Resilience of Cyber-Physical Systems and Machine Learning, a Scoping Review
J Pavão, R Bastardo, NP Rocha - International Conference on Information …, 2022 - Springer
The scoping review reported by this paper aimed to analyze and synthesize state-of-the-art
studies focused on the application of machine learning methods to enhance the cyber …
studies focused on the application of machine learning methods to enhance the cyber …
EFFICIENCY-BASED DEEP ENSEMBLE FRAMEWORK FOR NETWORK ATTACK DETECTION
G LAKSHMINARAYANA, RD NAGA… - International Journal of …, 2024 - ijitce.org
Business, training, and significant distance correspondence require networks. Networks give
many advantages, however security issues can think twice about classification, honesty, and …
many advantages, however security issues can think twice about classification, honesty, and …