Internet of things (IoT) security dataset evolution: Challenges and future directions

B Kaur, S Dadkhah, F Shoeleh, ECP Neto, P **ong… - Internet of Things, 2023 - Elsevier
The evolution of mobile technologies has introduced smarter and more connected objects
into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications …

A new ensemble-based intrusion detection system for internet of things

A Abbas, MA Khan, S Latif, M Ajaz, AA Shah… - Arabian Journal for …, 2022 - Springer
The domain of Internet of Things (IoT) has witnessed immense adaptability over the last few
years by drastically transforming human lives to automate their ordinary daily tasks. This is …

On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things

G Abdelmoumin, DB Rawat… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Anomaly-based machine learning-enabled intrusion detection systems (AML-IDSs) show
low performance and prediction accuracy while detecting intrusions in the Internet of Things …

[HTML][HTML] Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior

M Al-Fawa'reh, M Al-Fayoumi, S Nashwan… - Egyptian Informatics …, 2022 - Elsevier
Security issues are the most critical challenges facing new technologies associated with the
internet of things (IoT), big data, and cloud computing. A secure and efficient intrusion …

An overview of distributed denial of service traffic detection approaches

I Cvitić, D Peraković, M Periša… - PROMET …, 2019 - hrcak.srce.hr
Sažetak The availability of information and communication (IC) resources is a growing
problem caused by the increase in the number of users, IC services, and the capacity …

Robust attack detection approach for IIoT using ensemble classifier

V Priya, IS Thaseen, TR Gadekallu… - arxiv preprint arxiv …, 2021 - arxiv.org
Generally, the risks associated with malicious threats are increasing for the IIoT and its
related applications due to dependency on the Internet and the minimal resource availability …

[PDF][PDF] Network intrusion detection system: Machine learning approach

AS Jaradat, MM Barhoush, RB Easa - Indonesian Journal of …, 2022 - researchgate.net
The main goal of intrusion detection system (IDS) is to monitor the network performance and
to investigate any signs of any abnormalities over the network. Recently, intrusion detection …

An intrusion detection system based on machine learning for CAN-bus

D Tian, Y Li, Y Wang, X Duan, C Wang, W Wang… - Industrial Networks and …, 2018 - Springer
The CAN-Bus is currently the most widely used vehicle bus network technology, but it is
designed for needs of vehicle control system, having massive data and lacking of …

Lung nodule classification using deep ConvNets on CT images

H Sathyan, JV Panicker - 2018 9th International conference on …, 2018 - ieeexplore.ieee.org
Lung cancer is a hazardous disease which is the unrestricted growth of abnormal cells that
can occur in one or both of the lungs. Lung tumors can be of two types such as benign and …

Review on insider threat detection techniques

TO Oladimeji, CK Ayo… - Journal of Physics …, 2019 - iopscience.iop.org
An insider, also regarded as an employee of a company, becomes a threat when the
intention or action can affect the company negatively. Insider threat has been an eminent …