smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks
Nowadays, hackers take illegal advantage of distributed resources in a network of
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …
computing devices (ie, botnet) to launch cyberattacks against the Internet of Things (IoT) …
[HTML][HTML] Security enhancement and attack detection using optimized hybrid deep learning and improved encryption algorithm over Internet of Things
V Akshaya, V Mandala, C Anilkumar, P VishnuRaja… - Measurement …, 2023 - Elsevier
Exponential increases in smart devices and reduced costs of sensors have increased
applications using IoT (Internet of Things). There has been an extensive analysis on the …
applications using IoT (Internet of Things). There has been an extensive analysis on the …
A discrete time-varying greywolf IoT botnet detection system
M Alazab - Computer Communications, 2022 - Elsevier
Internet of things (IoT) is an emerging network that is trending due to advances in computing
and networking development. A botnet is an attack that threatens the IoT system because of …
and networking development. A botnet is an attack that threatens the IoT system because of …
Dynamic Adaptation Attack Detection Model for a Distributed Multi-Access Edge Computing Smart City
The internet of things (IoT) technology presents an intelligent way to improve our lives and
contributes to many fields such as industry, communications, agriculture, etc. Unfortunately …
contributes to many fields such as industry, communications, agriculture, etc. Unfortunately …
Cloud intrusion detection model based on deep belief network and grasshopper optimization
Cloud computing is a vast area which uses the resources cost-effectively. The performance
aspects and security are the main issues in cloud computing. Besides, the selection of …
aspects and security are the main issues in cloud computing. Besides, the selection of …
[图书][B] Adaptive energy saving and mobility support IPv6 routing protocol in low-power and lossy networks for internet of things and wireless sensor networks
AH Gidado - 2022 - search.proquest.com
Abstract Internet of Things (IoT) is an interconnection of physical objects that can be
controlled, monitored and exchange information from remote locations over the internet …
controlled, monitored and exchange information from remote locations over the internet …
On aggregation and prediction of cybersecurity incident reports
MV Carriegos, ÁLM Castañeda, MT Trobajo… - IEEE …, 2021 - ieeexplore.ieee.org
The study of cybersecurity incidents is an active research field. The purpose of this work is to
determine accurate measures of cybersecurity incidents. An effective method to aggregate …
determine accurate measures of cybersecurity incidents. An effective method to aggregate …
An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data
Abstract Nowadays Mobile Health (also termed as m-Health) is an essential component of
the healthcare sector. The m-healthcare uses different types of digitized devices (laptops …
the healthcare sector. The m-healthcare uses different types of digitized devices (laptops …
Leveraging Deep Learning Techniques for Securing the Internet of Things in the Age of Big Data
K Kaushik - … Artificial Intelligence in Cybersecurity Analytics and …, 2024 - Wiley Online Library
There is a growing need for adequate procedures to make sure that smart devices are
resistant to different threats and assaults on the Internet of Things (IoT) ecosystem as they …
resistant to different threats and assaults on the Internet of Things (IoT) ecosystem as they …
Cross-Layer Distributed Attack Detection Model for the IoT
HI Ahmed, AA Nasr, SM Abdel-Mageid… - International Journal of …, 2022 - igi-global.com
IoT is a huge network that contains many objects communicating with each other. It has a
collection of sensitive data which is vulnerable to various threats at different layers. Due to …
collection of sensitive data which is vulnerable to various threats at different layers. Due to …