A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux… - Computer …, 2024 - Elsevier
Abstract The Internet of Things (IoT) is transforming society by connecting businesses and
optimizing systems across industries. Its impact has been felt in healthcare, where it has the …

Current trends in AI and ML for cybersecurity: A state-of-the-art survey

N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …

Enhanced Active Eavesdroppers Detection System for Multi-hop WSNs in Tactical IoT Applications

M Abedini, I Al-Anbagi - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
In tactical Internet of Things (IoT) applications, the broadcast nature of wireless sensor
networks (WSNs) makes it easy to eavesdrop on their traffic. Furthermore, adversaries can …

[PDF][PDF] Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets.

P Nowakowski, P Zórawski, K Cabaj… - J. Wirel. Mob. Networks …, 2021 - isyou.info
Due to continuing improvements in defensive systems, malware developers create
increasingly sophisticated techniques to remain undetected on the infected machine for as …

Deep adversarial learning on google home devices

A Ranieri, D Caputo, L Verderame, A Merlo… - arXiv preprint arXiv …, 2021 - arxiv.org
Smart speakers and voice-based virtual assistants are core components for the success of
the IoT paradigm. Unfortunately, they are vulnerable to various privacy threats exploiting …

Convolutional neural network based intrusion detection system and predicting the DDoS attack

R Rinish Reddy, S Rachamalla, MS Yoosuf… - Data Intelligence and …, 2022 - Springer
In today's world, cybersecurity is important as it secures data against damage and
unauthorized access. In recent years, machine learning studies have made remarkable …

An Investigation on Open-RAN Specifications: Use Cases, Security Threats, Requirements, Discussions.

H Park, TH Nguyen, L Park - CMES-Computer Modeling in …, 2024 - search.ebscohost.com
The emergence of various technologies such as terahertz communications, Reconfigurable
Intelligent Surfaces (RIS), and AI-powered communication services will burden network …

[PDF][PDF] An IEEE 802.11 MAC Layer Covert Channel Based On Supported Rates

G Teca, M Natkaniec - International Journal of Electronics and …, 2023 - journals.pan.pl
Wireless Local Area Networks present several vulnerabilities that are exploited, and as a
result, numerous attacks have been developed and used against them. Although …

Enhancing Sniffing Detection in IoT Home Wi-Fi Networks: An Ensemble Learning Approach With Network Monitoring System (NMS)

HJ Jin, FR Ghashghaei, N Elmrabit, Y Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
Network packet sniffing is one of the techniques that is widely used in the network and cyber
security fields. However, sniffing can also be used as a malicious technique that allows …

A model for the disclosure of probe attacks based on the utilization of machine learning algorithms

H Al-Mimi, NA Hamad… - 2023 10th International …, 2023 - ieeexplore.ieee.org
The Probe attack is one of the most perilous kinds of cyberattacks since its primary objective
is to get knowledge on the vulnerabilities of the target network. In the course of this research …