Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects

U Inayat, MF Zia, S Mahmood, HM Khalid… - Electronics, 2022‏ - mdpi.com
Internet of Things (IoT) is a develo** technology that provides the simplicity and benefits of
exchanging data with other devices using the cloud or wireless networks. However, the …

Machine learning-powered encrypted network traffic analysis: A comprehensive survey

M Shen, K Ye, X Liu, L Zhu, J Kang… - … Surveys & Tutorials, 2022‏ - ieeexplore.ieee.org
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …

Machine learning and the Internet of Things security: Solutions and open challenges

U Farooq, N Tariq, M Asim, T Baker… - Journal of Parallel and …, 2022‏ - Elsevier
Abstract Internet of Things (IoT) is a pervasively-used technology for the last few years. IoT
technologies are also responsible for intensifying various everyday smart applications …

Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning

R Heartfield, G Loukas, A Bezemskij… - IEEE Transactions on …, 2020‏ - ieeexplore.ieee.org
The modern Internet of Things (IoT)-based smart home is a challenging environment to
secure: devices change, new vulnerabilities are discovered and often remain unpatched …

[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JII Araya, H Rifà-Pous - Internet of Things, 2023‏ - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

[HTML][HTML] Review of Smart-Home Security Using the Internet of Things

G Vardakis, G Hatzivasilis, E Koutsaki, N Papadakis - Electronics, 2024‏ - mdpi.com
As the Internet of Things (IoT) continues to revolutionize the way we interact with our living
spaces, the concept of smart homes has become increasingly prevalent. However, along …

Deep reinforcement learning-based task offloading in satellite-terrestrial edge computing networks

D Zhu, H Liu, T Li, J Sun, J Liang… - 2021 IEEE Wireless …, 2021‏ - ieeexplore.ieee.org
In remote regions (eg, mountain and desert), cellular networks are usually sparsely
deployed or unavailable. With the appearance of new applications (eg, industrial automation …

Application layer security for internet communications: A comprehensive review, challenges, and future trends

D Cevallos-Salas, J Estrada-Jiménez… - Computers and Electrical …, 2024‏ - Elsevier
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …

Blockchain based non-repudiable IoT data trading: Simpler, faster, and cheaper

F Chen, J Wang, C Jiang, T **ang… - IEEE INFOCOM 2022 …, 2022‏ - ieeexplore.ieee.org
Next-generation wireless technology and machine-to-machine technology can provide the
ability to connect and share data at any time among IoT smart devices. However, the …

Who's controlling my device? Multi-user multi-device-aware access control system for shared smart home environment

AK Sikder, L Babun, ZB Celik, H Aksu… - ACM Transactions on …, 2022‏ - dl.acm.org
Multiple users have access to multiple devices in a smart home system–typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …