Edge-computing-driven internet of things: A survey
The Internet of Things (IoT) is impacting the world's connectivity landscape. More and more
IoT devices are connected, bringing many benefits to our daily lives. However, the influx of …
IoT devices are connected, bringing many benefits to our daily lives. However, the influx of …
Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions
In the last decade, huge growth is recorded globally in computer networks and Internet of
Things (IoT) networks due to the exponential data generation, approximately zettabyte to a …
Things (IoT) networks due to the exponential data generation, approximately zettabyte to a …
A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things
H Xu, Z Sun, Y Cao, H Bilal - Soft Computing, 2023 - Springer
Cyber-attacks and network intrusion have surfaced as major concerns for modern days
applications of the Internet of Things (IoT). The existing intrusion detection and prevention …
applications of the Internet of Things (IoT). The existing intrusion detection and prevention …
An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection
M Mohy-Eddine, A Guezzaz, S Benkirane… - Multimedia Tools and …, 2023 - Springer
Abstract The Internet of Things (IoT) interconnects billions of sensors and actuators to serve
a meaningful purpose. However, it is always vulnerable to various menaces. Thus, IoT …
a meaningful purpose. However, it is always vulnerable to various menaces. Thus, IoT …
Host-based IDS: A review and open issues of an anomaly detection system in IoT
Abstract The Internet of Things (IoT) envisions a smart environment powered by connectivity
and heterogeneity where ensuring reliable services and communications across multiple …
and heterogeneity where ensuring reliable services and communications across multiple …
Blockchain-empowered cloud architecture based on secret sharing for smart city
Recent advances in information technology go beyond the simple convenience offered to
individuals, leading to smart city technology that provides urban facilities and better quality …
individuals, leading to smart city technology that provides urban facilities and better quality …
A review of anomaly detection strategies to detect threats to cyber-physical systems
N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …
components. CPS has experienced rapid growth over the past decade in fields as disparate …
[HTML][HTML] A comprehensive review on 5G-based smart healthcare network security: taxonomy, issues, solutions and future research directions
Healthcare is experiencing a fast change from a hospital-centric and specialist-focused
model to one that is dispersed and patient-centric. Numerous technological advancements …
model to one that is dispersed and patient-centric. Numerous technological advancements …
[PDF][PDF] A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions
With the advancement of information and communication technologies, fifth-generation (5G)
has become an emerging communication medium to support higher speed, lower latency …
has become an emerging communication medium to support higher speed, lower latency …
[PDF][PDF] Two-stage hybrid malware detection using deep learning
With the increasing number and variety of Internet of Things (IoT) devices supporting a wide
range of services such as smart homes, smart transportation, and smart factories in smart …
range of services such as smart homes, smart transportation, and smart factories in smart …