[HTML][HTML] A deep learning-based intrusion detection system for MQTT enabled IoT
A large number of smart devices in Internet of Things (IoT) environments communicate via
different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely …
different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely …
[PDF][PDF] Anomaly Detection for Internet of Things Cyberattacks.
M Alanazi, A Aljuhani - Computers, Materials & Continua, 2022 - researchgate.net
The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of
improving quality of service and facilitating human lives. The IoT revolution has redefined …
improving quality of service and facilitating human lives. The IoT revolution has redefined …
[HTML][HTML] Artificial intelligence algorithms for detecting and classifying MQTT protocol Internet of Things attacks
A Alzahrani, THH Aldhyani - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) grew in popularity in recent years, becoming a crucial
component of industrial, residential, and telecommunication applications, among others …
component of industrial, residential, and telecommunication applications, among others …
Threat analysis model to control IoT network routing attacks through deep learning approach
K Janani, S Ramamoorthy - Connection Science, 2022 - Taylor & Francis
Most of the recent research has focused on the Internet of Things (IoT) and its applications.
The open interface and network connectivity of the interconnected systems under the IoT …
The open interface and network connectivity of the interconnected systems under the IoT …
A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection
Abstract The Internet of Medical Things (IoMT) has a network of interconnected medical
devices to capture patients' health metrics and store them in a centralized server for analysis …
devices to capture patients' health metrics and store them in a centralized server for analysis …
Healthcare: A priority-based energy harvesting scheme for managing sensor nodes in WBANs
S Gherairi - Ad Hoc Networks, 2022 - Elsevier
The eHealth service has been considered a potential resource issue for industry and
academia and is remarkably similar to a promising technology for continuous monitoring of …
academia and is remarkably similar to a promising technology for continuous monitoring of …
[PDF][PDF] Design of a Novel Deep Learning Methodology for IOT Botnet based Attack Detection
The hackers take advantage of the rapid expansion of the Internet of Things (IoT) to launch
attacks on connected devices. There must be a reliable way to identify hostile attacks in …
attacks on connected devices. There must be a reliable way to identify hostile attacks in …
[HTML][HTML] Editorial “Industrial IoT as IT and OT Convergence: Challenges and Opportunities”
C Giannelli, M Picone - IoT, 2022 - mdpi.com
During the last decade, the advent of the Internet of Things (IoT) and its quick and pervasive
evolution have significantly revolutionized the Information Technology ecosystem. The IoT …
evolution have significantly revolutionized the Information Technology ecosystem. The IoT …
Analysis of hybrid deep learning models for efficient intrusion detection
Enhanced with digital capabilities over the preceding ten years, especially on the internet,
there has been a surge in cyber attackers attempting to profit from consumers' private …
there has been a surge in cyber attackers attempting to profit from consumers' private …
[HTML][HTML] Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection
In the dynamic and ever-evolving realm of network security, the ability to accurately identify
and classify portscan attacks both inside and outside networks is of paramount importance …
and classify portscan attacks both inside and outside networks is of paramount importance …