Cyber-physical systems security: Limitations, issues and future trends
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …
which can monitor and manipulate real objects and processes. They are closely related to …
A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast
proliferation in many areas such as wearable devices, smart sensors and home appliances …
proliferation in many areas such as wearable devices, smart sensors and home appliances …
A survey of intrusion detection in Internet of Things
BB Zarpelão, RS Miani, CT Kawakani… - Journal of Network and …, 2017 - Elsevier
Abstract Internet of Things (IoT) is a new paradigm that integrates the Internet and physical
objects belonging to different domains such as home automation, industrial process, human …
objects belonging to different domains such as home automation, industrial process, human …
Intrusion detection model using machine learning algorithm on Big Data environment
Recently, the huge amounts of data and its incremental increase have changed the
importance of information security and data analysis systems for Big Data. Intrusion …
importance of information security and data analysis systems for Big Data. Intrusion …
Network intrusion detection system based on recursive feature addition and bigram technique
Network and Internet security is a critical universal issue. The increased rate of cyber
terrorism has put national security under risk. In addition, Internet attacks have caused …
terrorism has put national security under risk. In addition, Internet attacks have caused …
[PDF][PDF] A hybrid approach for network intrusion detection
Due to the widespread use of the internet and smart devices, various attacks like intrusion,
zero-day, Malware, and security breaches are a constant threat to any organization's …
zero-day, Malware, and security breaches are a constant threat to any organization's …
Intrusion detection based on machine learning in the internet of things, attacks and counter measures
E Rehman, M Haseeb-ud-Din, AJ Malik… - The Journal of …, 2022 - Springer
Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its
emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT …
emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT …
Intrusion detection in networks using cuckoo search optimization
One of the key problems for researchers and network managers is anomaly detection in
network traffic. Anomalies in network traffic might signal a network intrusion, requiring the …
network traffic. Anomalies in network traffic might signal a network intrusion, requiring the …
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …
among researchers in the development of theoretical and practical concepts, and their …
A survey on forensics and compliance auditing for critical infrastructure protection
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …