Machine learning approaches to IoT security: A systematic literature review

R Ahmad, I Alsmadi - Internet of Things, 2021 - Elsevier
With the continuous expansion and evolution of IoT applications, attacks on those IoT
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …

Zero-day attack detection: a systematic literature review

R Ahmad, I Alsmadi, W Alhamdani… - Artificial Intelligence …, 2023 - Springer
With the continuous increase in cyberattacks over the past few decades, the quest to
develop a comprehensive, robust, and effective intrusion detection system (IDS) in the …

A comprehensive deep learning benchmark for IoT IDS

R Ahmad, I Alsmadi, W Alhamdani, L Tawalbeh - Computers & Security, 2022 - Elsevier
The significance of an intrusion detection system (IDS) in networks security cannot be
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …

The role of blockchain to secure internet of medical things

YY Ghadi, T Mazhar, T Shahzad, M Amir khan… - Scientific Reports, 2024 - nature.com
This study explores integrating blockchain technology into the Internet of Medical Things
(IoMT) to address security and privacy challenges. Blockchain's transparency …

A survey on botnets: Incentives, evolution, detection and current trends

SN Thanh Vu, M Stege, PI El-Habr, J Bang, N Dragoni - Future Internet, 2021 - mdpi.com
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained
prominence in an era of pervasive computing and the Internet of Things. Botnets have …

A deep learning ensemble approach to detecting unknown network attacks

R Ahmad, I Alsmadi, W Alhamdani… - Journal of Information …, 2022 - Elsevier
The majority of the intrusion detection solutions proposed using machine learning and deep
learning approaches are based on known attack classes only. Comprehensive threat …

Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator

I Obaidat, B Kahn, F Tavakoli… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
DDoSim, a simulation testbed for mimicking real-world, large-scale botnet DDoS attacks, is
presented. DDoSim offers various capabilities, including running user-specified software …

Analysis of integration of IoMT with blockchain: issues, challenges and solutions

T Mazhar, SFA Shah, SA Inam, JB Awotunde… - Discover Internet of …, 2024 - Springer
Abstract The incorporation of Artificial Intelligence (AI) into the fields of Neurosurgery and
Neurology has transformed the landscape of the healthcare industry. The present study …

Secure and efficient authentication scheme in IoT environments

A Thakare, YG Kim - Applied Sciences, 2021 - mdpi.com
Optimization of resource consumption and decreasing the response time of authentication
requests is an immense urgent requirement for supporting the scalability of resources in IoT …

An analysis into physical and virtual power draw characteristics of embedded wireless sensor network devices under dos and rpl-based attacks

P Przybocki, VG Vassilakis - Sensors, 2023 - mdpi.com
Currently, within the world, cybercrime is becoming increasingly rampant—often targeting
civil infrastructure like power stations and other critical systems. A trend that is being noticed …