Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey for IoT security datasets taxonomy, classification and machine learning mechanisms
C Alex, G Creado, W Almobaideen, OA Alghanam… - Computers & …, 2023 - Elsevier
This survey paper compares existing IoT related datasets found in the literature with three
main objectives. The first one is to highlight the characteristics of these datasets such as the …
main objectives. The first one is to highlight the characteristics of these datasets such as the …
An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning
With the rapid growth of the number of connected devices that exchange personal, sensitive,
and important data through the IoT based global network, attacks that are targeting security …
and important data through the IoT based global network, attacks that are targeting security …
[HTML][HTML] A new blockchain-based authentication framework for secure IoT networks
Most current research on decentralized IoT applications focuses on a specific vulnerability.
However, for IoT applications, only a limited number of techniques are dedicated to handling …
However, for IoT applications, only a limited number of techniques are dedicated to handling …
Fusion-based anomaly detection system using modified isolation forest for internet of things
In recent years, advanced threat and zero day attacks are increasing significantly, but the
traditional network intrusion detection system based on feature filtering or based on a well …
traditional network intrusion detection system based on feature filtering or based on a well …
Real-time detection system for data exfiltration over DNS tunneling using machine learning
The domain name system (DNS) plays a vital role in network services for name resolution.
By default, this service is seldom blocked by security solutions. Thus, it has been exploited …
By default, this service is seldom blocked by security solutions. Thus, it has been exploited …
A lightweight hierarchical key management approach for internet of things
Z Najafi, S Babaie - Journal of Information Security and Applications, 2023 - Elsevier
Abstract Internet of Things (IoT) as an emerging technology connects a wide range of
various elements that have a unique identifier to create an intelligent computing system …
various elements that have a unique identifier to create an intelligent computing system …
A robust and efficient vector-based key management scheme for IoT networks
Abstract Information and communication security is a critical concern in the rapid growth of
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …
[PDF][PDF] Hybrid feature selection method for intrusion detection systems based on an improved intelligent water drop algorithm
A critical task and a competitive research area is to secure networks against attacks. One of
the most popular security solutions is Intrusion Detection Systems (IDS). Machine learning …
the most popular security solutions is Intrusion Detection Systems (IDS). Machine learning …
IFKMS: inverse function-based key management scheme for IoT networks
Due to the rapid growth of the Internet of Things (IoT), secure communication is becoming a
significant concern. Nodes that compose such a dynamic network need to exchange …
significant concern. Nodes that compose such a dynamic network need to exchange …
[HTML][HTML] Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
Internet communication is one of the significant aspects of modern civilization. People use
banking, health, social, or shop** platforms and send a lot of data. Each communication …
banking, health, social, or shop** platforms and send a lot of data. Each communication …