Edge-computing-driven internet of things: A survey

L Kong, J Tan, J Huang, G Chen, S Wang, X Jin… - ACM Computing …, 2022 - dl.acm.org
The Internet of Things (IoT) is impacting the world's connectivity landscape. More and more
IoT devices are connected, bringing many benefits to our daily lives. However, the influx of …

Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions

AR Khan, M Kashif, RH Jhaveri, R Raut… - Security and …, 2022 - Wiley Online Library
In the last decade, huge growth is recorded globally in computer networks and Internet of
Things (IoT) networks due to the exponential data generation, approximately zettabyte to a …

A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things

H Xu, Z Sun, Y Cao, H Bilal - Soft Computing, 2023 - Springer
Cyber-attacks and network intrusion have surfaced as major concerns for modern days
applications of the Internet of Things (IoT). The existing intrusion detection and prevention …

An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection

M Mohy-Eddine, A Guezzaz, S Benkirane… - Multimedia Tools and …, 2023 - Springer
Abstract The Internet of Things (IoT) interconnects billions of sensors and actuators to serve
a meaningful purpose. However, it is always vulnerable to various menaces. Thus, IoT …

Host-based IDS: A review and open issues of an anomaly detection system in IoT

I Martins, JS Resende, PR Sousa, S Silva… - Future Generation …, 2022 - Elsevier
Abstract The Internet of Things (IoT) envisions a smart environment powered by connectivity
and heterogeneity where ensuring reliable services and communications across multiple …

Blockchain-empowered cloud architecture based on secret sharing for smart city

J Cha, SK Singh, TW Kim, JH Park - Journal of Information Security and …, 2021 - Elsevier
Recent advances in information technology go beyond the simple convenience offered to
individuals, leading to smart city technology that provides urban facilities and better quality …

A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …

[HTML][HTML] A comprehensive review on 5G-based smart healthcare network security: taxonomy, issues, solutions and future research directions

A Ahad, Z Ali, A Mateen, M Tahir, A Hannan, NM Garcia… - Array, 2023 - Elsevier
Healthcare is experiencing a fast change from a hospital-centric and specialist-focused
model to one that is dispersed and patient-centric. Numerous technological advancements …

[PDF][PDF] A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions

JH Park, S Rathore, SK Singh, MM Salim… - Hum.-Centric Comput …, 2021 - hcisj.com
With the advancement of information and communication technologies, fifth-generation (5G)
has become an emerging communication medium to support higher speed, lower latency …

[PDF][PDF] Two-stage hybrid malware detection using deep learning

S Baek, J Jeon, B Jeong, YS Jeong - Human-centric Computing and …, 2021 - hcisj.com
With the increasing number and variety of Internet of Things (IoT) devices supporting a wide
range of services such as smart homes, smart transportation, and smart factories in smart …