[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
Securing the internet of robotic things: a comprehensive review on machine learning-based intrusion detection
M Nkoom, SG Hounsinou… - Journal of Cyber Security …, 2024 - Taylor & Francis
ABSTRACT The Internet of Robotic Things (IoRT) emerges from integrating robotics into the
Internet of things (IoT). The dynamic nature of the IoRT environment poses unique security …
Internet of things (IoT). The dynamic nature of the IoRT environment poses unique security …
Generative AI for secure physical layer communications: A survey
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating
rapid advancement and unparalleled proficiency in generating diverse content. Beyond …
rapid advancement and unparalleled proficiency in generating diverse content. Beyond …
Current trends in AI and ML for cybersecurity: A state-of-the-art survey
N Mohamed - Cogent Engineering, 2023 - Taylor & Francis
This paper provides a comprehensive survey of the state-of-the-art use of Artificial
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …
Intelligence (AI) and Machine Learning (ML) in the field of cybersecurity. The paper …
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges
Abstract The Internet of Things (IoT) scenario places important challenges even for deep
learning-based intrusion detection systems. IoTs are highly heterogeneous networks in …
learning-based intrusion detection systems. IoTs are highly heterogeneous networks in …
Survey on Unified Threat Management (UTM) Systems for Home Networks
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …
professional network administration support, while sophisticated attacks pose enormous …
Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review
Abstract The Internet of Things (IoT) has emerged as an inevitable part of human life, that
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
includes online learning, smart homes, smart cars, smart grids, smart cities, agriculture, and …
LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network
Vehicular ad-hoc network (VANET) plays a vital role in emerging Intelligent Transportation
System (ITS). VANET's deal with the group of network that are designed in ad-hoc model in …
System (ITS). VANET's deal with the group of network that are designed in ad-hoc model in …
Cybersecurity anomaly detection: Ai and ethereum blockchain for a secure and tamperproof ioht data management
The Internet of Healthcare Things (IoHT) is an emerging critical technology for managing
patients' health. They are prone to cybersecurity vulnerabilities because they are connected …
patients' health. They are prone to cybersecurity vulnerabilities because they are connected …
Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network
Middle-box based attacks create serious functional defects in the devices such as firewalls,
address translators, load balancers, server units, and other data inspecting devices. Middle …
address translators, load balancers, server units, and other data inspecting devices. Middle …