Role of machine learning and deep learning in securing 5G-driven industrial IoT applications

P Sharma, S Jain, S Gupta, V Chamola - Ad Hoc Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) connects millions of computing devices and has set a
stage for future technology where industrial use cases like smart cities and smart houses will …

Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Forensic analysis on internet of things (IoT) device using machine-to-machine (M2M) framework

MS Mazhar, Y Saleem, A Almogren, J Arshad… - Electronics, 2022 - mdpi.com
The versatility of IoT devices increases the probability of continuous attacks on them. The
low processing power and low memory of IoT devices have made it difficult for security …

A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

Security and internet of things: benefits, challenges, and future perspectives

H Taherdoost - Electronics, 2023 - mdpi.com
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate
their efforts on system security. Any vulnerability could lead to a system failure or …

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan, UK Lilhore, B Seth… - Journal of Cloud …, 2023 - Springer
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Preventing mqtt vulnerabilities using iot-enabled intrusion detection system

M Husnain, K Hayat, E Cambiaso, UU Fayyaz… - Sensors, 2022 - mdpi.com
The advancement in the domain of IoT accelerated the development of new communication
technologies such as the Message Queuing Telemetry Transport (MQTT) protocol. Although …

IoT-enabled water distribution systems—A comparative technological review

NK Velayudhan, P Pradeep, SN Rao… - IEEE …, 2022 - ieeexplore.ieee.org
Water distribution systems are one of the critical infrastructures and major assets of the water
utility in a nation. The infrastructure of the distribution systems consists of resources …