Security and privacy for 6G: A survey on prospective technologies and challenges
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …
ground integrated network environment, novel technologies, and an accessible user …
Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions
Abstract The Internet of Things (IoT) is one of the most widely used technologies today, and
it has a significant effect on our lives in a variety of ways, including social, commercial, and …
it has a significant effect on our lives in a variety of ways, including social, commercial, and …
Edge learning for B5G networks with distributed signal processing: Semantic communication, edge computing, and wireless sensing
To process and transfer large amounts of data in emerging wireless services, it has become
increasingly appealing to exploit distributed data communication and learning. Specifically …
increasingly appealing to exploit distributed data communication and learning. Specifically …
Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
In this paper, we present a survey of deep learning approaches for cyber security intrusion
detection, the datasets used, and a comparative study. Specifically, we provide a review of …
detection, the datasets used, and a comparative study. Specifically, we provide a review of …
Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …
and communication advancements will empower better administration of accessible …
Adversarial machine learning for network intrusion detection systems: A comprehensive survey
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …
network attacks that compromise the security of the data, systems, and networks. In recent …
A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
A Khraisat, A Alazab - Cybersecurity, 2021 - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …
Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions
The field of Explainable Artificial Intelligence (XAI) has garnered considerable research
attention in recent years, aiming to provide interpretability and confidence to the inner …
attention in recent years, aiming to provide interpretability and confidence to the inner …
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
Abstract Internet of Things (IoT) is one of the most rapidly used technologies in the last
decade in various applications. The smart things are connected in wireless or wired for …
decade in various applications. The smart things are connected in wireless or wired for …
Blockchain meets metaverse and digital asset management: A comprehensive survey
Envisioned to be the next-generation Internet, the metaverse has been attracting enormous
attention from both the academia and industry. The metaverse can be viewed as a 3D …
attention from both the academia and industry. The metaverse can be viewed as a 3D …