Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection

M Karthikeyan, D Manimegalai, K RajaGopal - Scientific Reports, 2024 - nature.com
Abstract A Wireless Sensor Network (WSN) aided by the Internet of Things (IoT) is a
collaborative system of WSN systems and IoT networks are work to exchange, gather, and …

A self-attention-based deep convolutional neural networks for IIoT networks intrusion detection

MS Alshehri, O Saidani, FS Alrayes, SF Abbasi… - IEEE …, 2024 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) comprises a variety of systems, smart devices, and an
extensive range of communication protocols. Hence, these systems face susceptibility to …

Machine learning based intrusion detection system for IoMT

P Kulshrestha, TV Vijay Kumar - International Journal of System Assurance …, 2024 - Springer
Millennials have the advantage of accessing readily available modern scientific
advancements, particularly in technology. One of these technologies that encompasses …

[HTML][HTML] ROAST-IoT: a novel range-optimized attention convolutional scattered technique for intrusion detection in IoT networks

A Mahalingam, G Perumal, G Subburayalu, M Albathan… - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) has significantly benefited several businesses, but because of
the volume and complexity of IoT systems, there are also new security issues. Intrusion …

IoT intrusion detection: a review of ml and dl-based approaches

I Rakine, K El Guemmat, S Ouahabi… - 2024 4th International …, 2024 - ieeexplore.ieee.org
The world is becoming more and more tied to the Internet of Things (IoT) technology. It is
present in almost every era: healthcare, agriculture, education, industry, etc. This technology …

Class imbalance data handling with optimal deep learning-based intrusion detection in IoT environment

M Srinivasan, NC Senthilkumar - Soft Computing, 2024 - Springer
Abstract The Internet of Things (IoT) has performed a paradigm shift in the method devices
and systems interact, allowing seamless connectivity and communication. But, the …

ABCNN-IDS: attention-based convolutional neural network for intrusion detection in IoT networks

A Momand, SU Jan, N Ramzan - Wireless Personal Communications, 2024 - Springer
This paper proposes an attention-based convolutional neural network (ABCNN) for intrusion
detection in the Internet of Things (IoT). The proposed ABCNN employs an attention …

Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification.

Q Wu, H Xu, M Liu - Computers, Materials & Continua, 2024 - search.ebscohost.com
Network traffic identification is critical for maintaining network security and further meeting
various demands of network applications. However, network traffic data typically possesses …

[PDF][PDF] Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble.

A Singh, HA Abosaq, S Arif, Z Mushtaq… - … , Materials & Continua, 2024 - researchgate.net
Data security assurance is crucial due to the increasing prevalence of cloud computing and
its widespread use across different industries, especially in light of the growing number of …

An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security

J Maruthupandi, S Sivakumar, BL Dhevi, S Prasanna… - Scientific Reports, 2025 - nature.com
In recent times, there has been rapid growth of technologies that have enabled smart
infrastructures-IoT-powered smart grids, cities, and healthcare systems. But these resource …