A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions
In the past several years, the world has witnessed an acute surge in the production and
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
A survey on security issues in IoT operating systems
P Sun, Y Wan, Z Wu, Z Fang - Journal of Network and Computer …, 2024 - Elsevier
The security issues of the core (operating systems) of the Internet of Things (IoT) are
becoming increasingly urgent and prominent, this article conducts a systematic research …
becoming increasingly urgent and prominent, this article conducts a systematic research …
Fault tolerance in fog-based Social Internet of Things
Abstract The Social Internet of Things (SIoT) is a glimpse into the future for self-
establishment of inter-things social relationships that guarantee object-to-object …
establishment of inter-things social relationships that guarantee object-to-object …
Trustworthiness analysis and evaluation for command and control cyber-physical systems using generalized stochastic Petri nets
X Sun, Z Yu, H Gao, X Li - Information Sciences, 2023 - Elsevier
Command and control systems are a typical kind of cyber-physical systems (CPSs), usually
called command and control CPSs (C 3 PSs). C 3 PSs are in general thought of as the most …
called command and control CPSs (C 3 PSs). C 3 PSs are in general thought of as the most …
A Q-learning-based two-layer cooperative intrusion detection for internet of drones system
M Wu, Z Zhu, Y Xia, Z Yan, X Zhu, N Ye - Drones, 2023 - mdpi.com
The integration of unmanned aerial vehicles (UAVs) and the Internet of Things (IoT) has
opened up new possibilities in various industries. However, with the increasing number of …
opened up new possibilities in various industries. However, with the increasing number of …
Cooperative location-sensing network based on vehicular communication security against attacks
Z Wang, S Wang, MZA Bhuiyan, J Xu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Various attacks in communication network threaten the security of vehicular system. For
cooperative location-sensing system, man-in-the-middle attack and eavesdropping attack …
cooperative location-sensing system, man-in-the-middle attack and eavesdropping attack …
[PDF][PDF] Hybrid deep neural network model for detection of security attacks in IoT enabled environment
The extensive use of Internet of Things (IoT) appliances has greatly contributed in the growth
of smart cities. Moreover, the smart city deploys IoT-enabled applications, communications …
of smart cities. Moreover, the smart city deploys IoT-enabled applications, communications …
Reliability Modeling of Dynamic Spatiotemporal IoT Considering Autonomy and Cooperativity Based on Multi-Agent
Q Feng, X Guo, B Sun, H Dui, Y Ren… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Reliability modeling in the context of the Internet of Things (IoT) has received considerable
attention from researchers to ensure the safety and stable operation of the relevant systems …
attention from researchers to ensure the safety and stable operation of the relevant systems …
Analyzing anonymous activities using Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) in IoT
The intrusion detection process is important in various applications to identify unauthorized
Internet of Things (IoT) network access. IoT devices are accessed by intermediators while …
Internet of Things (IoT) network access. IoT devices are accessed by intermediators while …
A Novel Network Intrusion Detection System Based on Semi-Supervised Approach for IoT
BA Durga, N Mangla - International Journal of Advanced …, 2023 - search.proquest.com
An intrusion detection system (IDS) is one of the most effective ways to secure a network and
prevent unauthorized access and security attacks. But due to the lack of adequately labeled …
prevent unauthorized access and security attacks. But due to the lack of adequately labeled …