[HTML][HTML] Enhancing IoT network security through deep learning-powered Intrusion Detection System
The rapid growth of the Internet of Things (IoT) has brought about a global concern for the
security of interconnected devices and networks. This necessitates the use of efficient …
security of interconnected devices and networks. This necessitates the use of efficient …
[HTML][HTML] CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on internet of things networks
The Internet of Things (IoT) has brought significant advancements that have connected our
world more closely than ever before. However, the growing number of connected devices …
world more closely than ever before. However, the growing number of connected devices …
[HTML][HTML] TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks
Abstract The Internet of Things (IoT) is a global network that connects a large number of
smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to …
smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to …
Design of an intrusion detection model for IoT-enabled smart home
Machine learning (ML) provides effective solutions to develop efficient intrusion detection
system (IDS) for various environments. In the present paper, a diversified study of various …
system (IDS) for various environments. In the present paper, a diversified study of various …
[HTML][HTML] Trustworthy Artificial Intelligence Methods for Users' Physical and Environmental Security: A Comprehensive Review
S Szymoniak, F Depta, Ł Karbowiak, M Kubanek - Applied Sciences, 2023 - mdpi.com
Artificial Intelligence is an indispensable element of the modern world, constantly evolving
and contributing to the emergence of new technologies. We meet it in everyday applications …
and contributing to the emergence of new technologies. We meet it in everyday applications …
[PDF][PDF] A hybrid deep learning-based intrusion detection system for IoT networks
NW Khan, MS Alshehri, MA Khan, S Almakdi… - Math. Biosci …, 2023 - aimspress.com
The Internet of Things (IoT) is a rapidly evolving technology with a wide range of potential
applications, but the security of IoT networks remains a major concern. The existing system …
applications, but the security of IoT networks remains a major concern. The existing system …
Abnormal transactions detection in the ethereum network using semi-supervised generative adversarial networks
YK Sanjalawe, SR Al-E'mari - IEEE Access, 2023 - ieeexplore.ieee.org
Numerous abnormal transactions have been exposed as a result of targeted attacks on
Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting …
Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting …
[PDF][PDF] Intrusion detection in the Internet of Things using fusion of GRU-LSTM deep learning model
Cybersecurity threats are increasing rapidly as hackers use advanced techniques. As a
result, cybersecurity has now a significant factor in protecting organizational limits. Intrusion …
result, cybersecurity has now a significant factor in protecting organizational limits. Intrusion …
Traffic data extraction and labeling for machine learning based attack detection in IoT networks
H Gebrye, Y Wang, F Li - International Journal of Machine Learning and …, 2023 - Springer
The fast expansion of the Internet of Things (IoT) networks raises the possibility of further
network threats. In today's world, network traffic analysis has become an increasingly critical …
network threats. In today's world, network traffic analysis has become an increasingly critical …
Toward Enhanced Attack Detection and Explanation in Intrusion Detection System-Based IoT Environment Data
RW Wardhani, DSC Putranto, U Jo, H Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) against cyber threats is a formidable challenge, and
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …
Intrusion Detection Systems (IDS) play a critical role in this effort. However, the lack of …