Machine learning approaches to IoT security: A systematic literature review
With the continuous expansion and evolution of IoT applications, attacks on those IoT
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …
Zero-day attack detection: a systematic literature review
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …
A comprehensive deep learning benchmark for IoT IDS
The significance of an intrusion detection system (IDS) in networks security cannot be
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …
The role of blockchain to secure internet of medical things
This study explores integrating blockchain technology into the Internet of Medical Things
(IoMT) to address security and privacy challenges. Blockchain's transparency …
(IoMT) to address security and privacy challenges. Blockchain's transparency …
A survey on botnets: Incentives, evolution, detection and current trends
SN Thanh Vu, M Stege, PI El-Habr, J Bang, N Dragoni - Future Internet, 2021 - mdpi.com
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained
prominence in an era of pervasive computing and the Internet of Things. Botnets have …
prominence in an era of pervasive computing and the Internet of Things. Botnets have …
A deep learning ensemble approach to detecting unknown network attacks
The majority of the intrusion detection solutions proposed using machine learning and deep
learning approaches are based on known attack classes only. Comprehensive threat …
learning approaches are based on known attack classes only. Comprehensive threat …
Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator
I Obaidat, B Kahn, F Tavakoli… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
DDoSim, a simulation testbed for mimicking real-world, large-scale botnet DDoS attacks, is
presented. DDoSim offers various capabilities, including running user-specified software …
presented. DDoSim offers various capabilities, including running user-specified software …
Analysis of integration of IoMT with blockchain: issues, challenges and solutions
T Mazhar, SFA Shah, SA Inam, JB Awotunde… - Discover Internet of …, 2024 - Springer
Abstract The incorporation of Artificial Intelligence (AI) into the fields of Neurosurgery and
Neurology has transformed the landscape of the healthcare industry. The present study …
Neurology has transformed the landscape of the healthcare industry. The present study …
Secure and efficient authentication scheme in IoT environments
A Thakare, YG Kim - Applied Sciences, 2021 - mdpi.com
Optimization of resource consumption and decreasing the response time of authentication
requests is an immense urgent requirement for supporting the scalability of resources in IoT …
requests is an immense urgent requirement for supporting the scalability of resources in IoT …
An analysis into physical and virtual power draw characteristics of embedded wireless sensor network devices under dos and rpl-based attacks
P Przybocki, VG Vassilakis - Sensors, 2023 - mdpi.com
Currently, within the world, cybercrime is becoming increasingly rampant—often targeting
civil infrastructure like power stations and other critical systems. A trend that is being noticed …
civil infrastructure like power stations and other critical systems. A trend that is being noticed …