A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast
proliferation in many areas such as wearable devices, smart sensors and home appliances …
proliferation in many areas such as wearable devices, smart sensors and home appliances …
A hybrid deep learning-driven SDN enabled mechanism for secure communication in Internet of Things (IoT)
The Internet of Things (IoT) has emerged as a new technological world connecting billions of
devices. Despite providing several benefits, the heterogeneous nature and the extensive …
devices. Despite providing several benefits, the heterogeneous nature and the extensive …
SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT
The Internet of Things (IoT) has proven to be a billion-dollar industry. Despite offering
numerous benefits, the prevalent nature of IoT makes it vulnerable and a possible target for …
numerous benefits, the prevalent nature of IoT makes it vulnerable and a possible target for …
IoT network security: Threats, risks, and a data-driven defense framework
The recent surge in Internet of Things (IoT) deployment has increased the pace of
integration and extended the reach of the Internet from computers, tablets and phones to a …
integration and extended the reach of the Internet from computers, tablets and phones to a …
Intelligent detection of iot botnets using machine learning and deep learning
As the number of Internet of Things (IoT) devices connected to the network rapidly increases,
network attacks such as flooding and Denial of Service (DoS) are also increasing. These …
network attacks such as flooding and Denial of Service (DoS) are also increasing. These …
Classifier performance evaluation for lightweight IDS using fog computing in IoT security
In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector
Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing …
Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing …
Automated iot device identification based on full packet information using real-time network traffic
In an Internet of Things (IoT) environment, a large volume of potentially confidential data
might be leaked from sensors installed everywhere. To ensure the authenticity of such …
might be leaked from sensors installed everywhere. To ensure the authenticity of such …
[HTML][HTML] Integrity and privacy assurance framework for remote healthcare monitoring based on IoT
Remote healthcare monitoring (RHM) has become a pivotal component of modern
healthcare, offering a crucial lifeline to numerous patients. Ensuring the integrity and privacy …
healthcare, offering a crucial lifeline to numerous patients. Ensuring the integrity and privacy …
[HTML][HTML] Multilevel central trust management approach for task scheduling on IoT-based mobile cloud computing
With the increasing number of mobile devices and IoT devices across a wide range of real-
life applications, our mobile cloud computing devices will not cope with this growing number …
life applications, our mobile cloud computing devices will not cope with this growing number …
Tracing your smart-home devices conversations: A real world IoT traffic data-set
M Anagnostopoulos, G Spathoulas, B Viaño… - Sensors, 2020 - mdpi.com
Smart-home installations exponential growth has raised major security concerns. To this
direction, the GHOST project, a European Union Horizon 2020 Research and Innovation …
direction, the GHOST project, a European Union Horizon 2020 Research and Innovation …