An overview of safety and security analysis frameworks for the internet of things
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous
benefits, including many security and safety-critical applications. However, unlocking the full …
benefits, including many security and safety-critical applications. However, unlocking the full …
Dependability of the internet of things: Current status and challenges
The advances in the Internet of Things (IoT) has substantially contributed to the automation
of modern societies by making physical things around us more interconnected and remotely …
of modern societies by making physical things around us more interconnected and remotely …
Unsupervised learning for feature selection: A proposed solution for botnet detection in 5g networks
The world has seen exponential growth in deploying Internet of Things (IoT) devices. In
recent years, connected IoT devices have surpassed the number of connected non-IoT …
recent years, connected IoT devices have surpassed the number of connected non-IoT …
Machine learning for botnet detection: An optimized feature selection approach
Technological advancements have been evolving for so long, particularly Internet of Things
(IoT) technology that has seen an increase in the number of connected devices surpass non …
(IoT) technology that has seen an increase in the number of connected devices surpass non …
Electric vehicle energy consumption prediction for unknown route types using deep neural networks by combining static and dynamic data
Accurate energy consumption prediction of electric vehicles (EVs) is crucial for drivers
considering long trips. All the data should be provided beforehand to determine the energy …
considering long trips. All the data should be provided beforehand to determine the energy …
[HTML][HTML] Internet of Things botnets: A survey on Artificial Intelligence based detection techniques
Abstract The Internet of Things (IoT) is a game changer when it comes to digitization across
industries. The Fourth Industrial Revolution (4IR), brought about a paradigm shift indeed …
industries. The Fourth Industrial Revolution (4IR), brought about a paradigm shift indeed …
A DTW Approach for Complex Data A Case Study with Network Data Streams
Dynamic Time War** (DTW) is a robust method to measure the similarity between two
sequences. This paper proposes a method based on DTW to analyse high-speed data …
sequences. This paper proposes a method based on DTW to analyse high-speed data …
Sequential Pattern Mining: A Proposed Approach for Intrusion Detection Systems
Technological advancements have played a pivotal role in the rapid proliferation of the
fourth industrial revolution (4IR) through the deployment of Internet of Things (IoT) devices in …
fourth industrial revolution (4IR) through the deployment of Internet of Things (IoT) devices in …
Machine Learning for Malware Detection in Network Traffic
Develo** advanced and efficient malware detection systems is becoming significant in
light of the growing threat landscape in cybersecurity. This work aims to tackle the enduring …
light of the growing threat landscape in cybersecurity. This work aims to tackle the enduring …
Detecting DNS Tunnelling and Data Exfiltration Using Dynamic Time War**
Browsing the web relies on the Domain Name System (DNS) protocol. In short, it resolves
domain names to addresses and manages zones of domain spaces in subtrees. With the …
domain names to addresses and manages zones of domain spaces in subtrees. With the …