A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …
Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats
Despite its technological benefits, the Internet of Things (IoT) has cyber weaknesses due to
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …
vulnerabilities in the wireless medium. Machine Larning (ML)-based methods are widely …
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model
The fourth industrial revolution is marked by the rapid growth of Internet of Things (IoT)
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …
[HTML][HTML] A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain
The current advances in the Internet of Things (IoT) and the solutions being offered by this
technology have accounted IoT among the top ten technologies that will transform the global …
technology have accounted IoT among the top ten technologies that will transform the global …
Botnets unveiled: A comprehensive survey on evolving threats and defense strategies
M Asadi, MAJ Jamali, A Heidari… - Transactions on …, 2024 - Wiley Online Library
Botnets have emerged as a significant internet security threat, comprising networks of
compromised computers under the control of command and control (C&C) servers. These …
compromised computers under the control of command and control (C&C) servers. These …
A hybrid deep learning approach for bottleneck detection in IoT
Cloud computing is perhaps the most enticing innovation in the present figuring situation. It
gives an expense-effective arrangement by diminishing the enormous forthright expense of …
gives an expense-effective arrangement by diminishing the enormous forthright expense of …
Energy analysis-based cyber attack detection by IoT with artificial intelligence in a sustainable smart city
Cybersecurity continues to be a major issue for all industries engaged in digital activity given
the cyclical surge in security incidents. Since more Internet of Things (IoT) devices are being …
the cyclical surge in security incidents. Since more Internet of Things (IoT) devices are being …
Mobility management of unmanned aerial vehicles in ultra–dense heterogeneous networks
The rapid growth of mobile data traffic will lead to the deployment of Ultra–Dense Networks
(UDN) in the near future. Various networks must overlap to meet the massive demands of …
(UDN) in the near future. Various networks must overlap to meet the massive demands of …
Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms
O Kornyo, M Asante, R Opoku, K Owusu-Agyemang… - Computers & …, 2023 - Elsevier
Abstract STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Escalation of
privilege) in advance metering infrastructure (AMI) and cloud computing have been …
privilege) in advance metering infrastructure (AMI) and cloud computing have been …
A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection
N Saini, V Bhat Kasaragod… - Concurrency and …, 2023 - Wiley Online Library
A persistent, targeted cyber attack is called an advanced persistent threat (APT) attack. The
attack is mainly launched to gain sensitive information, take over the system, and for …
attack is mainly launched to gain sensitive information, take over the system, and for …