An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
Abstract The Industrial Internet of Things (IIoT) promises to deliver innovative business
models across multiple domains by providing ubiquitous connectivity, intelligent data …
models across multiple domains by providing ubiquitous connectivity, intelligent data …
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
S Shitharth, AM Alshareef, AO Khadidos, KH Alyoubi… - Scientific Reports, 2023 - nature.com
Ensuring the privacy and trustworthiness of smart city—Internet of Things (IoT) networks
have recently remained the central problem. Cyborg intelligence is one of the most popular …
have recently remained the central problem. Cyborg intelligence is one of the most popular …
A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT)
QA Al‐Haija, A Droos - Expert Systems, 2024 - Wiley Online Library
The proliferating popularity of Internet of Things (IoT) devices has led to wide‐scale
networked system implementations across multiple disciplines, including transportation …
networked system implementations across multiple disciplines, including transportation …
Iot-based intrusion detection systems: a review
TS Mohamed, S Aydin - Smart Science, 2022 - Taylor & Francis
ABSTRACT Internet of Things (IoT) is a modern prototype that merges physical entities
affiliated with a variety of fields, like industrial tasks, firm automation, mortal fitness, and …
affiliated with a variety of fields, like industrial tasks, firm automation, mortal fitness, and …
A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection
Abstract The Internet of Medical Things (IoMT) has a network of interconnected medical
devices to capture patients' health metrics and store them in a centralized server for analysis …
devices to capture patients' health metrics and store them in a centralized server for analysis …
[PDF][PDF] Automatic leukaemia segmentation approach for blood cancer classification using microscopic images
Leukaemia is a type of blood cancer that is caused by undeveloped White Blood Cells
(WBC), and it is also called a blast blood cell. In the marrow of human bones, leukaemia is …
(WBC), and it is also called a blast blood cell. In the marrow of human bones, leukaemia is …
A hybrid Ant Lion Optimization algorithm based lightweight deep learning framework for cyber attack detection in IoT environment
BB Gupta, A Gaurav, RW Attar, V Arya, S Bansal… - Computers and …, 2025 - Elsevier
Abstract Internet of Things (IoTs) are integral part of Web3, in which they are used for
information collecting and sharing. However, the limited storage capacity of IoT decides …
information collecting and sharing. However, the limited storage capacity of IoT decides …
[PDF][PDF] Security of Big Data over IoT Environment by Integration of Deep Learning and Optimization
NN Alleema, R Raman, F Castro-Cayllahua… - International Journal of …, 2022 - academia.edu
This is especially true given the spread of IoT, which makes it possible for two-way
communication between various electronic devices and is therefore essential to …
communication between various electronic devices and is therefore essential to …
Anomaly-based Intrusion Detection System for smart lighting
Abstract Smart Lighting Systems (SLS) are essential to smart cities, offering enhanced
energy efficiency and public safety. However, they are susceptible to security threats …
energy efficiency and public safety. However, they are susceptible to security threats …
Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems
B Isong, O Kgote, A Abu-Mahfouz - Electronics, 2024 - mdpi.com
The swift explosion of Internet of Things (IoT) devices has brought about a new era of
interconnectivity and ease of use while simultaneously presenting significant security …
interconnectivity and ease of use while simultaneously presenting significant security …