[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Securing the internet of robotic things: a comprehensive review on machine learning-based intrusion detection

M Nkoom, SG Hounsinou… - Journal of Cyber Security …, 2024 - Taylor & Francis
ABSTRACT The Internet of Robotic Things (IoRT) emerges from integrating robotics into the
Internet of things (IoT). The dynamic nature of the IoRT environment poses unique security …

Generative AI for secure physical layer communications: A survey

C Zhao, H Du, D Niyato, J Kang, Z **ong… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating
rapid advancement and unparalleled proficiency in generating diverse content. Beyond …

Current trends in AI and ML for cybersecurity: A state-of-the-art survey

N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …

Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges

A Rizzardi, S Sicari, AC Porisini - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) scenario places important challenges even for deep
learning-based intrusion detection systems. IoTs are highly heterogeneous networks in …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review

P Shukla, CR Krishna, NV Patil - The Journal of Supercomputing, 2024 - Springer
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …

LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network

S Jayashree, SVN Santhosh Kumar - Wireless Networks, 2024 - Springer
Vehicular ad-hoc network (VANET) plays a vital role in emerging Intelligent Transportation
System (ITS). VANET's deal with the group of network that are designed in ad-hoc model in …

Cybersecurity anomaly detection: Ai and ethereum blockchain for a secure and tamperproof ioht data management

OP Olawale, S Ebadinezhad - IEEE Access, 2024 - ieeexplore.ieee.org
The Internet of Healthcare Things (IoHT) is an emerging critical technology for managing
patients' health. They are prone to cybersecurity vulnerabilities because they are connected …

Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network

H Bangali, P Rodrigues, V Pandimurugan… - Wireless …, 2024 - Springer
Middle-box based attacks create serious functional defects in the devices such as firewalls,
address translators, load balancers, server units, and other data inspecting devices. Middle …