Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review
M Abdullahi, Y Baashar, H Alhussian, A Alwadain… - Electronics, 2022 - mdpi.com
In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0),
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have …
IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …
devices are especially damaging and need to be addressed. In this treatise, we overview …
CNN-CNN: dual convolutional neural network approach for feature selection and attack detection on internet of things networks
The Internet of Things (IoT) has brought significant advancements that have connected our
world more closely than ever before. However, the growing number of connected devices …
world more closely than ever before. However, the growing number of connected devices …
Federated deep learning for anomaly detection in the internet of things
X Wang, Y Wang, Z Javaheri, L Almutairi… - Computers and …, 2023 - Elsevier
Privacy has emerged as a top worry as a result of the development of zero-day hacks
because IoT devices produce and transmit sensitive information through the regular internet …
because IoT devices produce and transmit sensitive information through the regular internet …
Blockchain technology and artificial intelligence based decentralized access control model to enable secure interoperability for healthcare
SK Rana, SK Rana, K Nisar, AA Ag Ibrahim, AK Rana… - Sustainability, 2022 - mdpi.com
Healthcare, one of the most important industries, is data-oriented, but most of the research in
this industry focuses on incorporating the internet of things (IoT) or connecting medical …
this industry focuses on incorporating the internet of things (IoT) or connecting medical …
A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks
This study explores the growing challenges of cybersecurity in the context of rapidly adopted
Internet of Things (IoT) technologies, which have become increasingly susceptible to cyber …
Internet of Things (IoT) technologies, which have become increasingly susceptible to cyber …
Approach for detecting attacks on IoT networks based on ensemble feature selection and deep learning models
The Internet of Things (IoT) has transformed our interaction with technology and introduced
security challenges. The growing number of IoT attacks poses a significant threat to …
security challenges. The growing number of IoT attacks poses a significant threat to …
[PDF][PDF] Deep learning algorithms for intrusion detection systems in internet of things using CIC-IDS 2017 dataset
Due to technological advancements in recent years, the availability and usage of smart
electronic gadgets have drastically increased. Adoption of these smart devices for a variety …
electronic gadgets have drastically increased. Adoption of these smart devices for a variety …
Combining unsupervised approaches for near real-time network traffic anomaly detection
F Carrera, V Dentamaro, S Galantucci, A Iannacone… - Applied Sciences, 2022 - mdpi.com
The 0-day attack is a cyber-attack based on vulnerabilities that have not yet been published.
The detection of anomalous traffic generated by such attacks is vital, as it can represent a …
The detection of anomalous traffic generated by such attacks is vital, as it can represent a …
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Abstract Internet of Things (IoT) driven systems have been sharply growing in the recent
times but this evolution is hampered by cybersecurity threats like spoofing, denial of service …
times but this evolution is hampered by cybersecurity threats like spoofing, denial of service …