[HTML][HTML] A deep learning-based intrusion detection system for MQTT enabled IoT

MA Khan, MA Khan, SU Jan, J Ahmad, SS Jamal… - Sensors, 2021 - mdpi.com
A large number of smart devices in Internet of Things (IoT) environments communicate via
different messaging protocols. Message Queuing Telemetry Transport (MQTT) is a widely …

[PDF][PDF] Anomaly Detection for Internet of Things Cyberattacks.

M Alanazi, A Aljuhani - Computers, Materials & Continua, 2022 - researchgate.net
The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of
improving quality of service and facilitating human lives. The IoT revolution has redefined …

[HTML][HTML] Artificial intelligence algorithms for detecting and classifying MQTT protocol Internet of Things attacks

A Alzahrani, THH Aldhyani - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) grew in popularity in recent years, becoming a crucial
component of industrial, residential, and telecommunication applications, among others …

Threat analysis model to control IoT network routing attacks through deep learning approach

K Janani, S Ramamoorthy - Connection Science, 2022 - Taylor & Francis
Most of the recent research has focused on the Internet of Things (IoT) and its applications.
The open interface and network connectivity of the interconnected systems under the IoT …

A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection

L Dhanya, R Chitra - Expert Systems with Applications, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) has a network of interconnected medical
devices to capture patients' health metrics and store them in a centralized server for analysis …

Healthcare: A priority-based energy harvesting scheme for managing sensor nodes in WBANs

S Gherairi - Ad Hoc Networks, 2022 - Elsevier
The eHealth service has been considered a potential resource issue for industry and
academia and is remarkably similar to a promising technology for continuous monitoring of …

[PDF][PDF] Design of a Novel Deep Learning Methodology for IOT Botnet based Attack Detection

AK Jakkani, P Reddy, J Jhurani - International Journal on Recent …, 2023 - researchgate.net
The hackers take advantage of the rapid expansion of the Internet of Things (IoT) to launch
attacks on connected devices. There must be a reliable way to identify hostile attacks in …

[HTML][HTML] Editorial “Industrial IoT as IT and OT Convergence: Challenges and Opportunities”

C Giannelli, M Picone - IoT, 2022 - mdpi.com
During the last decade, the advent of the Internet of Things (IoT) and its quick and pervasive
evolution have significantly revolutionized the Information Technology ecosystem. The IoT …

Analysis of hybrid deep learning models for efficient intrusion detection

B Ganesh, S Sridevi - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Enhanced with digital capabilities over the preceding ten years, especially on the internet,
there has been a surge in cyber attackers attempting to profit from consumers' private …

[HTML][HTML] Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection

B Alwasel, A Aldribi, M Alreshoodi, IS Alsukayti… - Applied Sciences, 2023 - mdpi.com
In the dynamic and ever-evolving realm of network security, the ability to accurately identify
and classify portscan attacks both inside and outside networks is of paramount importance …