How machine learning changes the nature of cyberattacks on IoT networks: A survey

E Bout, V Loscri, A Gallais - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has continued gaining in popularity and importance in everyday
life in recent years. However, this development does not only present advantages. Indeed …

A survey of methods supporting cyber situational awareness in the context of smart cities

N Neshenko, C Nader, E Bou-Harb, B Furht - Journal of Big Data, 2020 - Springer
A modern urban infrastructure no longer operates in isolation, but instead, leverages the
latest technologies to collect, process, and distribute aggregated knowledge in order to …

[HTML][HTML] Injection attack detection using machine learning for smart IoT applications

T Gaber, A El-Ghamry, AE Hassanien - Physical Communication, 2022 - Elsevier
Smart cities are a rapidly growing IoT application. These smart cities mainly rely on wireless
sensors to connect their different components (smart devices) together. Smart cities rely on …

An Approach to Risk Assessment and Threat Prediction for Complex Object Security Based on a Predicative Self-Configuring Neural System

NV Korneev, JV Korneeva, SP Yurkevichyus… - Symmetry, 2022 - mdpi.com
We identified a set of methods for solving risk assessment problems by forecasting an
incident of complex object security based on incident monitoring. The solving problem …

[PDF][PDF] New configurable galois/inverter ring oscillator (giro) physically unclonable functions: design, analysis and authentication algorithms

F Gebali - The Islamic University Journal of Applied Sciences …, 2022 - ece.uvic.ca
Ring oscillator physically unclonable function (RO-PUF) is a strong PUF that is simple to
operate and simple to fabricate for authentication and secure key exchange for IoT edge …

Denial-of-sleep attacks on IoT networks

E Bout - 2022 - theses.hal.science
In recent years, Internet of Things (IoT) networks have become new favorite targets for
attackers. Their fundamental characteristic such as their energy and calculation constraints …

Illuminating Cyber Threats for Smart Cities: A Data-Driven Approach for Cyber Attack Detection with Visual Capabilities

N Neshenko - 2021 - search.proquest.com
A modern urban infrastructure no longer operates in isolation but instead leverages the
latest technologies to collect, process, and distribute aggregated knowledge to improve the …

[PDF][PDF] Attaque par déni de sommeil sur les reseaux IoT

V Deniau - 2022 - theses.fr
Résumé Ces dernières années, les réseaux de l'Internet des Objets (IoT) sont devenus les
nouvelles cibles privilégiées des attaquants. Leur caractéristique fondamentale telle que …

Pengenalan Pola Serangan pada Internet of Thing (IoT) Menggunakan Support Vector Mechine (SVM) dengan Tiga Kernel

T Tasmi, F Antony, D Dhamyanti… - Jurnal …, 2023 - ejournal.unama.ac.id
Internet of things (IoT) technology is very popular these days around the world, with the
development of IoT technology raises the impact of security threats and attacks on IoT …

Cyber Situational Awareness Frontiers

N Neshenko, E Bou-Harb, B Furht - Smart Cities: Cyber Situational …, 2022 - Springer
Cyber situational awareness is a vital component of a holistic view of cybersecurity. This
chapter puts forward a new perspective on sustained cyber situational awareness for smart …