Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects
Internet of Things (IoT) is a develo** technology that provides the simplicity and benefits of
exchanging data with other devices using the cloud or wireless networks. However, the …
exchanging data with other devices using the cloud or wireless networks. However, the …
Machine learning-powered encrypted network traffic analysis: A comprehensive survey
Traffic analysis is the process of monitoring network activities, discovering specific patterns,
and gleaning valuable information from network traffic. It can be applied in various fields …
and gleaning valuable information from network traffic. It can be applied in various fields …
Machine learning and the Internet of Things security: Solutions and open challenges
Abstract Internet of Things (IoT) is a pervasively-used technology for the last few years. IoT
technologies are also responsible for intensifying various everyday smart applications …
technologies are also responsible for intensifying various everyday smart applications …
Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning
The modern Internet of Things (IoT)-based smart home is a challenging environment to
secure: devices change, new vulnerabilities are discovered and often remain unpatched …
secure: devices change, new vulnerabilities are discovered and often remain unpatched …
[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …
the internet, enable remote monitoring, automation, and control. However, collecting …
[HTML][HTML] Review of Smart-Home Security Using the Internet of Things
As the Internet of Things (IoT) continues to revolutionize the way we interact with our living
spaces, the concept of smart homes has become increasingly prevalent. However, along …
spaces, the concept of smart homes has become increasingly prevalent. However, along …
Deep reinforcement learning-based task offloading in satellite-terrestrial edge computing networks
In remote regions (eg, mountain and desert), cellular networks are usually sparsely
deployed or unavailable. With the appearance of new applications (eg, industrial automation …
deployed or unavailable. With the appearance of new applications (eg, industrial automation …
Application layer security for internet communications: A comprehensive review, challenges, and future trends
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
Blockchain based non-repudiable IoT data trading: Simpler, faster, and cheaper
Next-generation wireless technology and machine-to-machine technology can provide the
ability to connect and share data at any time among IoT smart devices. However, the …
ability to connect and share data at any time among IoT smart devices. However, the …
Who's controlling my device? Multi-user multi-device-aware access control system for shared smart home environment
Multiple users have access to multiple devices in a smart home system–typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …
dedicated app installed on a mobile device. Traditional access control mechanisms consider …