Intrusion detection and prevention in fog based IoT environments: A systematic literature review
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …
resources. An important ally of the IoT is fog computing. It extends cloud computing and …
IoT intrusion detection using machine learning with a novel high performing feature selection method
The Internet of Things (IoT) ecosystem has experienced significant growth in data traffic and
consequently high dimensionality. Intrusion Detection Systems (IDSs) are essential self …
consequently high dimensionality. Intrusion Detection Systems (IDSs) are essential self …
An intelligent intrusion detection system for smart consumer electronics network
The technological advancements of Internet of Things (IoT) has revolutionized traditional
Consumer Electronics (CE) into next-generation CE with higher connectivity and …
Consumer Electronics (CE) into next-generation CE with higher connectivity and …
Ensemble-learning framework for intrusion detection to enhance internet of things' devices security
Y Alotaibi, M Ilyas - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) comprises a network of interconnected nodes constantly
communicating, exchanging, and transferring data over various network protocols. Studies …
communicating, exchanging, and transferring data over various network protocols. Studies …
A lightweight IoT intrusion detection model based on improved BERT-of-Theseus
Z Wang, J Li, S Yang, X Luo, D Li… - Expert Systems with …, 2024 - Elsevier
The proliferation of Internet of Things (IoT) technology has resulted in an increase in security
vulnerabilities associated with the interconnectivity of IoT devices. As a result, there is a …
vulnerabilities associated with the interconnectivity of IoT devices. As a result, there is a …
[HTML][HTML] A review on recent approaches of machine learning, deep learning, and explainable artificial intelligence in intrusion detection systems
SB Mallampati, S Hari - Majlesi Journal of Electrical Engineering, 2023 - journals.iau.ir
In recent decades, network security has become increasingly crucial, and intrusion detection
systems play a critical role in securing it. An intrusion Detection System (IDS) is a …
systems play a critical role in securing it. An intrusion Detection System (IDS) is a …
DI‐ADS: A Deep Intelligent Distributed Denial of Service Attack Detection Scheme for Fog‐Based IoT Applications
Nowadays, fog computing plays a very vital role in providing many services to end‐based
IoT (Internet of Things) systems. The end IoT devices communicate with the middle layer fog …
IoT (Internet of Things) systems. The end IoT devices communicate with the middle layer fog …
Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data
RW Wardhani, DSC Putranto, U Jo, H Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) against cyber threats is a formidable challenge, and
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …
Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security
S Krishnasamy, MB Alotaibi, LI Alehaideb, Q Abbas - Sensors, 2023 - mdpi.com
In the current digital era, Wireless Sensor Networks (WSNs) and the Internet of Things (IoT)
are evolving, transforming human experiences by creating an interconnected environment …
are evolving, transforming human experiences by creating an interconnected environment …
Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems
Network intrusion is one of the main threats to organizational networks and systems. Its
timely detection is a profound challenge for the security of networks and systems. The …
timely detection is a profound challenge for the security of networks and systems. The …