Role of machine learning and deep learning in securing 5G-driven industrial IoT applications
Abstract The Internet of Things (IoT) connects millions of computing devices and has set a
stage for future technology where industrial use cases like smart cities and smart houses will …
stage for future technology where industrial use cases like smart cities and smart houses will …
Internet of things security: challenges and key issues
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …
various objects and intelligent devices. The three important components of IoT are sensing …
A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …
Forensic analysis on internet of things (IoT) device using machine-to-machine (M2M) framework
The versatility of IoT devices increases the probability of continuous attacks on them. The
low processing power and low memory of IoT devices have made it difficult for security …
low processing power and low memory of IoT devices have made it difficult for security …
A review of anomaly detection strategies to detect threats to cyber-physical systems
N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …
components. CPS has experienced rapid growth over the past decade in fields as disparate …
Security and internet of things: benefits, challenges, and future perspectives
H Taherdoost - Electronics, 2023 - mdpi.com
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate
their efforts on system security. Any vulnerability could lead to a system failure or …
their efforts on system security. Any vulnerability could lead to a system failure or …
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …
approach is proposed in this assessment to deal with the problem of identifying new …
Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …
some form of smart device in their homes or workplaces. These devices are often off-the …
Preventing mqtt vulnerabilities using iot-enabled intrusion detection system
The advancement in the domain of IoT accelerated the development of new communication
technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although …
technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although …
IoT-enabled water distribution systems—A comparative technological review
Water distribution systems are one of the critical infrastructures and major assets of the water
utility in a nation. The infrastructure of the distribution systems consists of resources …
utility in a nation. The infrastructure of the distribution systems consists of resources …