DDoS attack detection techniques in IoT networks: a survey
Abstract The Internet of Things (IoT) is a rapidly emerging technology that has become more
valuable and vital in our daily lives. This technology enables connection and communication …
valuable and vital in our daily lives. This technology enables connection and communication …
Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data,
actuators that perform mechanical actions on the sensor's collected data, and gateways …
actuators that perform mechanical actions on the sensor's collected data, and gateways …
Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review
R Reyes-Acosta, C Dominguez-Baez… - International Journal of …, 2025 - Springer
This study introduces the implementation of a Multivocal Literature Review (MLR) approach
to analyze machine learning (ML) and deep learning (DL) strategies for securing the …
to analyze machine learning (ML) and deep learning (DL) strategies for securing the …
Lcsa-fed: a low cost semi-asynchronous federated learning based on lag tolerance for services QoS prediction
L Cai, Y Liu, J Xu, M Jin - Cluster Computing, 2025 - Springer
As a distributed training method, federated learning (FL) has been widely used in the field of
quality-of-service (QoS) prediction. However, existing FL-based QoS prediction methods …
quality-of-service (QoS) prediction. However, existing FL-based QoS prediction methods …
[PDF][PDF] Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of …
Enhancing the interconnection of devices and systems, the Internet of Things (IoT) is a
paradigm-shifting technology. IoT security concerns are still a substantial concern despite its …
paradigm-shifting technology. IoT security concerns are still a substantial concern despite its …
RPL-Shield: A Deep Learning GNN-Based Approach for Protecting IoT Networks from RPL Routing Table Falsification Attacks
Considering the growing threats within the domain of the Internet of Things (IoT), this
research responds to the pressing need for protection measures that would help to prevent …
research responds to the pressing need for protection measures that would help to prevent …
Safety in the Sky: Cloud-Powered Smart Security for Vehicular Crowdsensing
Y Sahraoui, CA Kerrache - Mobile Crowdsensing and Remote Sensing in …, 2024 - Springer
This chapter delves into the fusion of cutting-edge machine learning (ML) and deep learning
(DL) technologies within cloud-powered smart security systems, specifically designed for …
(DL) technologies within cloud-powered smart security systems, specifically designed for …
[PDF][PDF] Unveiling the core of IoT
K Kaur, A Kaur, Y Gulzar, V Gandhi - 2024 - core.ac.uk
Connected devices and Internet usage are increasing worldwide, mostly in North America,
west Europe, and China (Kandaswamy and Furlonger, 2018). In 2024, machine-to-machine …
west Europe, and China (Kandaswamy and Furlonger, 2018). In 2024, machine-to-machine …
Improved Deep Perceptual Hashing Algorithm (IDP-HA), Information Retrieval System, Microsoft Common Objects In Context (MS COCO), Remote Cloud Computing …
OA Ismael, IFH Hassan - Baghdad Science Journal, 2024 - bsj.uobaghdad.edu.iq
The growth of information retrieval and associated services can be attributed to technical
advancements. Meanwhile, traditional information retrieval methods are impacted by …
advancements. Meanwhile, traditional information retrieval methods are impacted by …