DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT

A Rajak, R Tripathi - International Journal of Information Technology, 2024 - Springer
The advancement of 5G technology has enabled the IIoT (Industrial Internet of Things) to
integrate artificial intelligence, cloud computing, and edge computing in real-time, leading to …

Ensemble adaptive online machine learning in data stream: a case study in cyber intrusion detection system

K Roshan, A Zafar - International Journal of Information Technology, 2024 - Springer
Adaptive online machine learning using data streams is an emerging research area in which
algorithms learn dynamically from live data and update regularly for future predictions. On …

Spreading cybersecurity awareness via gamification: zero-day game

F Abu-Amara, RA Hosani, HA Tamimi… - International Journal of …, 2024 - Springer
This research project aims to increase the employees' cybersecurity awareness by
proposing a training program that consists of pre-game and post-game phishing attacks, pre …

A network intrusion detection method for information systems using federated learning and improved transformer

Q Zhou, Z Wang - International Journal on Semantic Web and …, 2024 - igi-global.com
A network intrusion detection method for information systems using federated learning and
improved transformer is proposed to address the problems of long detection time and low …

Detection of botnet in IoT network through machine learning based optimized feature importance via ensemble models

SM din, R Sharma, F Rizvi, N Sharma - International Journal of Information …, 2024 - Springer
The number of cyberattacks has grown along with the expansion of the Internet of Things
(IoT), which necessitates detection of cyberattacks on IoT devices. Different machine …

[HTML][HTML] Hybrid Machine Learning for IoT-Enabled Smart Buildings

RA Craciun, SI Caramihai, Ș Mocanu, RN Pietraru… - Informatics, 2025 - mdpi.com
This paper presents an intrusion detection system (IDS) leveraging a hybrid machine
learning approach aimed at enhancing the security of IoT devices at the edge, specifically …

A lightweight identity based generalized signcryption scheme for secure communication in standard model

T Singh, M Kumar, DJ Gelmecha, GK Thakur… - International Journal of …, 2024 - Springer
The implementation of secure communication in the Industrial Internet of Things (IIoT) has
made and it is a significant security concern. Identity-based generalized signcryption …

IFTTT-based secure smart farming monitoring system: data integrity and agricultural optimization

R Lama, S Karmakar - International Journal of Information Technology, 2024 - Springer
Agricultural monitoring is pivotal for optimizing crop yields and farm productivity, yet
traditional systems face drawbacks such as limited coverage and inefficient resource …

PPFCM-SMOTE: a novel balancing system for anomaly detection in IoT edge using probabilistic possibilistic fuzzy clustering and SMOTE

J Manokaran, G Vairavel, J Vijaya - International Journal of Information …, 2024 - Springer
The immense growth of the Internet of Things (IoT) technology enables potential intruders
easy access to the IoT data. The Anomaly Detection System (ADS) detects abnormal …

An advanced security model for fog computing to tackle various attacks on the data link layer using the QQL-FHES scheme

V Balaji, P Selvaraj - International Journal of Information Technology, 2024 - Springer
Fog computing provides maximum flexibility and low latency by divesting the usage of cloud
resources and amenities to the end users. In rendering the services to the cloud …