A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …
Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy
Cloud computing (CC) plays a significant role in revolutionizing the information and
communication technology (ICT) industry, allowing flexible delivery of new services and …
communication technology (ICT) industry, allowing flexible delivery of new services and …
A hybrid deep learning approach for bottleneck detection in IoT
Cloud computing is perhaps the most enticing innovation in the present figuring situation. It
gives an expense-effective arrangement by diminishing the enormous forthright expense of …
gives an expense-effective arrangement by diminishing the enormous forthright expense of …
SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …
Real-time bot infection detection system using DNS fingerprinting and machine-learning
In today's cyberattacks, botnets are used as an advanced technique to generate
sophisticated and coordinated attacks. Infected systems connect to a command and control …
sophisticated and coordinated attacks. Infected systems connect to a command and control …
A hybrid model for botnet detection using machine learning
Botnet attacks are becoming a growing threat to the security of computer networks, and there
is a need for effective and efficient methods for detecting these attacks. In this study, we …
is a need for effective and efficient methods for detecting these attacks. In this study, we …
Advances in artificial intelligence for detecting algorithmically generated domains: Current trends and future prospects
This comprehensive review navigates the complex domain of Domain Generation
Algorithms (DGAs) and their detection using Artificial Intelligence (AI), revealing both …
Algorithms (DGAs) and their detection using Artificial Intelligence (AI), revealing both …
Machine learning for multi-classification of botnets attacks
The number of Internet of Things (IoT) devices connected to the network enlarges
dramatically these days. This leads to rising cyberattacks, such as botnets. These attacks …
dramatically these days. This leads to rising cyberattacks, such as botnets. These attacks …
A hybrid rule-based and machine learning system for Arabic check courtesy amount recognition
I Ahmad - Sensors, 2023 - mdpi.com
Courtesy amount recognition from bank checks is an important application of pattern
recognition. Although much progress has been made on isolated digit recognition for Indian …
recognition. Although much progress has been made on isolated digit recognition for Indian …
Machine learning and metaheuristic optimization algorithms for feature selection and botnet attack detection
M Maazalahi, S Hosseini - Knowledge and Information Systems, 2025 - Springer
Botnet attacks are done using a set of vulnerable systems called bots and managed by an
administrator called botmaster that they carry out attacks on a large scale. Various methods …
administrator called botmaster that they carry out attacks on a large scale. Various methods …