Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review
Internet of Things (IoT) technology is prospering and entering every part of our lives, be it
education, home, vehicles, or healthcare. With the increase in the number of connected …
education, home, vehicles, or healthcare. With the increase in the number of connected …
Intrusion detection systems for IoT-based smart environments: a survey
One of the goals of smart environments is to improve the quality of human life in terms of
comfort and efficiency. The Internet of Things (IoT) paradigm has recently evolved into a …
comfort and efficiency. The Internet of Things (IoT) paradigm has recently evolved into a …
When intrusion detection meets blockchain technology: a review
With the purpose of identifying cyber threats and possible incidents, intrusion detection
systems (IDSs) are widely deployed in various computer networks. In order to enhance the …
systems (IDSs) are widely deployed in various computer networks. In order to enhance the …
A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …
smart objects (things) that can continuously sense the events in their sensing domain and …
Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems
The increasing use of Industrial Internet of Things (IIoT) devices has heightened concerns
about cybersecurity threats, particularly botnet attacks. Traditional internet communication …
about cybersecurity threats, particularly botnet attacks. Traditional internet communication …
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures
Abstract Software-Defined Networking (SDN) has been proposed as an emerging network
architecture, which consists of decoupling the control planes and data planes of a network …
architecture, which consists of decoupling the control planes and data planes of a network …
Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …
necessity to help safeguard personal and organizational assets. However, with the …
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
Mobile cloud computing is applied in multiple industries to obtain cloud‐based services by
leveraging mobile technologies. With the development of the wireless networks, defending …
leveraging mobile technologies. With the development of the wireless networks, defending …
Designing collaborative blockchained signature-based intrusion detection in IoT environments
With the rapid development of Internet-of-Things (IoT), there is an increasing demand for
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …
securing the IoT environments. For such purpose, intrusion detection systems (IDSs) are one …
Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration
With the rapid development of Internet-of-Things (IoT), more smart devices can be
connected to the Internet, resulting in a dramatic increase of data transmission and …
connected to the Internet, resulting in a dramatic increase of data transmission and …