5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions

M Adil, H Song, MK Khan, A Farouk, Z Jin - Journal of Network and …, 2024 - Elsevier
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …

Review of botnet attack detection in SDN-enabled IoT Using machine learning

WG Negera, F Schwenker, TG Debelee, HM Melaku… - Sensors, 2022 - mdpi.com
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has
revolutionized the computing fields. These include the broad spectrum of connectivity to …

Deep ensemble-based efficient framework for network attack detection

F Rustam, A Raza, I Ashraf… - 2023 21st Mediterranean …, 2023 - ieeexplore.ieee.org
Nowadays, networks play a critical role in business, education, and daily life, allowing
people to communicate via different platforms across long distances. However, such …

Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques

M Gelgi, Y Guan, S Arunachala, M Samba Siva Rao… - Sensors, 2024 - mdpi.com
Internet of Things (IoT) technology has become an inevitable part of our daily lives. With the
increase in usage of IoT Devices, manufacturers continuously develop IoT technology …

A Model for Estimating Resiliency of AI-Based Classifiers Defending Against Cyber Attacks

K Barik, S Misra, LF Sanz - International Journal of Computational …, 2024 - Springer
AI techniques for cybersecurity are advancing, but AI-based classifiers are suspectable of
adversarial attacks. It is challenging to quantify the efforts required of an adversary to …

Managing Networked IoT Assets Using Practical and Scalable Traffic Inference

A Pashamokhtari - arXiv preprint arXiv:2310.10657, 2023 - arxiv.org
The Internet has recently witnessed unprecedented growth of a class of connected assets
called the Internet of Things (IoT). Due to relatively immature manufacturing processes and …

Fuzzy-Based Operational Resilience Modelling

A Ur-Rehman, J Kamruzzuman… - 2022 IEEE 9th …, 2022 - ieeexplore.ieee.org
Resilience is an increasingly important concept in current socio-economic landscapes. Due
to the competitive global context and security attacks, the organisations are looking for …

Detection of false data injection in electric energy metering platforms using gradient lifting decision trees and MLP neural networks

Y Zhu, Y Zhang, C Zhang, B Zhang, H Wang… - Discover Applied …, 2025 - Springer
This study investigates a false data injection detection method in an automatic data
acquisition platform for electric energy measurement with the aim of ensuring the stability …

Cyber Resilience of Cyber-Physical Systems and Machine Learning, a Scoping Review

J Pavão, R Bastardo, NP Rocha - International Conference on Information …, 2022 - Springer
The scoping review reported by this paper aimed to analyze and synthesize state-of-the-art
studies focused on the application of machine learning methods to enhance the cyber …

EFFICIENCY-BASED DEEP ENSEMBLE FRAMEWORK FOR NETWORK ATTACK DETECTION

G LAKSHMINARAYANA, RD NAGA… - International Journal of …, 2024 - ijitce.org
Business, training, and significant distance correspondence require networks. Networks give
many advantages, however security issues can think twice about classification, honesty, and …