Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review
M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends
The emergence of smart cities and sustainable development has become a globally
accepted form of urbanization. The epitome of smart city development has become possible …
accepted form of urbanization. The epitome of smart city development has become possible …
[HTML][HTML] Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks
Abstract The Internet of Things (IoT) is a complex and diverse network consisting of resource-
constrained sensors/devices/things that are vulnerable to various security threats …
constrained sensors/devices/things that are vulnerable to various security threats …
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system
A Gaurav, BB Gupta, PK Panigrahi - Enterprise Information …, 2023 - Taylor & Francis
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued
academics' and business information systems' attention in recent years. The Internet of …
academics' and business information systems' attention in recent years. The Internet of …
Deep recurrent neural network for IoT intrusion detection system
As a results of the large scale development of the Internet of Things (IoT), cloud computing
capabilities including networking, data storage, management, and analytics are brought very …
capabilities including networking, data storage, management, and analytics are brought very …
A survey on machine learning-based malware detection in executable files
J Singh, J Singh - Journal of Systems Architecture, 2021 - Elsevier
In last decade, a proliferation growth in the development of computer malware has been
done. Nowadays, cybercriminals (attacker) use malware as a weapon to carry out the …
done. Nowadays, cybercriminals (attacker) use malware as a weapon to carry out the …
A survey on internet of things security: Requirements, challenges, and solutions
Abstract Internet of Things (IoT) is one of the most promising technologies that aims to
enhance humans' quality of life (QoL). IoT plays a significant role in several fields such as …
enhance humans' quality of life (QoL). IoT plays a significant role in several fields such as …
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms
M Al-Hawawreh, M Alazab, MA Ferrag… - Journal of Network and …, 2024 - Elsevier
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
IoTBoT-IDS: A novel statistical learning-enabled botnet detection framework for protecting networks of smart cities
J Ashraf, M Keshk, N Moustafa, M Abdel-Basset… - Sustainable Cities and …, 2021 - Elsevier
The rapid proliferation of the Internet of Things (IoT) systems, has enabled transforming
urban areas into smart cities. Smart cities' paradigm has resulted in improved quality of life …
urban areas into smart cities. Smart cities' paradigm has resulted in improved quality of life …
An ensemble deep learning-based cyber-attack detection in industrial control system
A Al-Abassi, H Karimipour, A Dehghantanha… - Ieee …, 2020 - ieeexplore.ieee.org
The integration of communication networks and the Internet of Things (IoT) in Industrial
Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing …
Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing …