Machine learning approaches to IoT security: A systematic literature review

R Ahmad, I Alsmadi - Internet of Things, 2021 - Elsevier
With the continuous expansion and evolution of IoT applications, attacks on those IoT
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …

A survey on network security for cyber–physical systems: From threats to resilient design

S Kim, KJ Park, C Lu - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …

[HTML][HTML] The security of big data in fog-enabled IoT applications including blockchain: A survey

N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi… - Sensors, 2019 - mdpi.com
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …

[HTML][HTML] A review of machine learning and deep learning techniques for anomaly detection in IoT data

R Al-amri, RK Murugesan, M Man, AF Abdulateef… - Applied Sciences, 2021 - mdpi.com
Anomaly detection has gained considerable attention in the past couple of years. Emerging
technologies, such as the Internet of Things (IoT), are known to be among the most critical …

A comprehensive deep learning benchmark for IoT IDS

R Ahmad, I Alsmadi, W Alhamdani, L Tawalbeh - Computers & Security, 2022 - Elsevier
The significance of an intrusion detection system (IDS) in networks security cannot be
overstated in detecting and responding to malicious attacks. Failure to detect large-scale …

A review of security and privacy concerns in the internet of things (IoT)

M Aqeel, F Ali, MW Iqbal, TA Rana, M Arif… - Journal of …, 2022 - Wiley Online Library
The recent two decades have witnessed tremendous growth in Internet of things (IoT)
applications. There are more than 50 billion devices connected globally. IoT applications' …

Consumer-facing technology fraud: Economics, attack methods and potential solutions

MA Ali, MA Azad, MP Centeno, F Hao… - Future Generation …, 2019 - Elsevier
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …

Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

P Shukla, CR Krishna, NV Patil - The Journal of Supercomputing, 2024 - Springer
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …

Attacks on resource-constrained IoT devices and security solutions

R Sharma, N Sharma - International Journal of Software Science and …, 2022 - igi-global.com
An IoT is a complex system of interconnected electronic devices that exchange data over the
network. Due to the sensitive nature of the data involved in this new technological paradigm …

[HTML][HTML] VBQ-Net: a novel vectorization-based boost quantized network model for maximizing the security level of IoT system to prevent intrusions

G Perumal, G Subburayalu, Q Abbas, SM Naqi… - Systems, 2023 - mdpi.com
Data sharing with additional devices across wireless networks is made simple and
advantageous by the Internet of Things (IoT), an emerging technology. However, IoT …